@inbook{a72cd31c30f34c97aa70a746646cf193,
title = "Reasoning about secureinteroperation using soft constraints",
abstract = "The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a constraint satisfaction problem.",
author = "Stefano Bistarelli and Foley, \{Simon N.\} and Barry O'Sullivan",
year = "2005",
doi = "10.1007/0-387-24098-5\_13",
language = "English",
isbn = "0387240500",
series = "IFIP Advances in Information and Communication Technology",
publisher = "Springer New York LLC",
pages = "173--186",
booktitle = "Formal Aspects in Security and Trust - IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust and World Computer Congress, FAST 2004",
note = "IFIP TC1 WG1.7 2nd International Workshop on Formal Aspects in Security and Trust, FAST 2004 ; Conference date: 22-08-2004 Through 27-08-2004",
}