Possibilistic constraint satisfaction problems or “how to handle soft constraints?”
UAI '92 Proceedings of the eighth conference on Uncertainty in Artificial Intelligence
A shortest path network security model
Computers and Security
A filtering algorithm for constraints of difference in CSPs
AAAI '94 Proceedings of the twelfth national conference on Artificial intelligence (vol. 1)
Semiring-based constraint satisfaction and optimization
Journal of the ACM (JACM)
Protection in operating systems
Communications of the ACM
Conduit cascades and secure synchronization
Proceedings of the 2000 workshop on New security paradigms
The Cassowary linear arithmetic constraint solving algorithm
ACM Transactions on Computer-Human Interaction (TOCHI)
Constraint-Based Verification of Client-Server Protocols
CP '01 Proceedings of the 7th International Conference on Principles and Practice of Constraint Programming
CAV '97 Proceedings of the 9th International Conference on Computer Aided Verification
An Authorization Model and Its Formal Semantics
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Analysis of Integrity Policies using Soft Constraints
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Towards Automated Negotiation of Access Control Policies
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
The Complexity and Composability of Secure Interoperation
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Preventing the capture of sensitive information
Proceedings of the 43rd annual Southeast regional conference - Volume 2
A soft constraint-based approach to the cascade vulnerability problem
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Hi-index | 0.00 |
Establishing network security is based not just on the security of its component systems but also on how they are configured to interoperate. In this paper we consider how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security. Taking the constraints approach means that we are building on techniques that have proven success in solving large-scale problems from other domains.