Modeling and detecting the cascade vulnerability problem using soft constraints
Proceedings of the 2004 ACM symposium on Applied computing
Soft concurrent constraint programming
ACM Transactions on Computational Logic (TOCL)
A soft constraint-based approach to the cascade vulnerability problem
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Semiring-Based Soft Constraints
Concurrency, Graphs and Models
IAAI'04 Proceedings of the 16th conference on Innovative applications of artifical intelligence
Believing the Integrity of a System
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 0.00 |
An integrity policy defines the situations when modificationof information is authorized and is enforced by thesecurity mechanisms of the system. However, in a complexapplication system it is possible that an integrity policymay have been incorrectly specified and, as a result, a usermay be authorized to modify information that can lead toan unexpected system compromise. In this paper we outlinea scalable and quantitative technique that uses constraintsolving to model and analyze the effectiveness of applicationsystem integrity policies.