Modelling and detecting the cascade vulnerability problem using soft constraints. Bistarelli, S., Foley, S., & O'Sullivan, B. In Proceedings of the ACM Symposium on Applied Computing, volume 1, 2004. abstract bibtex Establishing network security is based not just on the security of its component systems but also on how they are configured to interoperate. In this paper we consider how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security. Taking the constraints approach means that we are building on techniques that have proven success in solving large-scale problems from other domains.
@inProceedings{
title = {Modelling and detecting the cascade vulnerability problem using soft constraints},
type = {inProceedings},
year = {2004},
identifiers = {[object Object]},
keywords = {Constraints,Multilevel Security,Security,Soft Constraints},
volume = {1},
id = {be4a8296-660c-333b-b27a-0f053948f944},
created = {2017-04-06T22:52:20.365Z},
file_attached = {false},
profile_id = {903920d0-d2a6-30df-a1d5-ff042699cff4},
last_modified = {2017-04-06T22:52:20.365Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {false},
hidden = {false},
private_publication = {false},
abstract = {Establishing network security is based not just on the security of its component systems but also on how they are configured to interoperate. In this paper we consider how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security. Taking the constraints approach means that we are building on techniques that have proven success in solving large-scale problems from other domains.},
bibtype = {inProceedings},
author = {Bistarelli, S. and Foley, S.N. and O'Sullivan, B.},
booktitle = {Proceedings of the ACM Symposium on Applied Computing}
}
Downloads: 0
{"_id":"SB9Rb6Qus9Bxj9sTm","bibbaseid":"bistarelli-foley-osullivan-modellinganddetectingthecascadevulnerabilityproblemusingsoftconstraints-2004","downloads":0,"creationDate":"2018-10-01T12:30:36.285Z","title":"Modelling and detecting the cascade vulnerability problem using soft constraints","author_short":["Bistarelli, S.","Foley, S.","O'Sullivan, B."],"year":2004,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"Modelling and detecting the cascade vulnerability problem using soft constraints","type":"inProceedings","year":"2004","identifiers":"[object Object]","keywords":"Constraints,Multilevel Security,Security,Soft Constraints","volume":"1","id":"be4a8296-660c-333b-b27a-0f053948f944","created":"2017-04-06T22:52:20.365Z","file_attached":false,"profile_id":"903920d0-d2a6-30df-a1d5-ff042699cff4","last_modified":"2017-04-06T22:52:20.365Z","read":false,"starred":false,"authored":"true","confirmed":false,"hidden":false,"private_publication":false,"abstract":"Establishing network security is based not just on the security of its component systems but also on how they are configured to interoperate. In this paper we consider how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security. Taking the constraints approach means that we are building on techniques that have proven success in solving large-scale problems from other domains.","bibtype":"inProceedings","author":"Bistarelli, S. and Foley, S.N. and O'Sullivan, B.","booktitle":"Proceedings of the ACM Symposium on Applied Computing","bibtex":"@inProceedings{\n title = {Modelling and detecting the cascade vulnerability problem using soft constraints},\n type = {inProceedings},\n year = {2004},\n identifiers = {[object Object]},\n keywords = {Constraints,Multilevel Security,Security,Soft Constraints},\n volume = {1},\n id = {be4a8296-660c-333b-b27a-0f053948f944},\n created = {2017-04-06T22:52:20.365Z},\n file_attached = {false},\n profile_id = {903920d0-d2a6-30df-a1d5-ff042699cff4},\n last_modified = {2017-04-06T22:52:20.365Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {false},\n hidden = {false},\n private_publication = {false},\n abstract = {Establishing network security is based not just on the security of its component systems but also on how they are configured to interoperate. In this paper we consider how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security. Taking the constraints approach means that we are building on techniques that have proven success in solving large-scale problems from other domains.},\n bibtype = {inProceedings},\n author = {Bistarelli, S. and Foley, S.N. and O'Sullivan, B.},\n booktitle = {Proceedings of the ACM Symposium on Applied Computing}\n}","author_short":["Bistarelli, S.","Foley, S.","O'Sullivan, B."],"bibbaseid":"bistarelli-foley-osullivan-modellinganddetectingthecascadevulnerabilityproblemusingsoftconstraints-2004","role":"author","urls":{},"keyword":["Constraints","Multilevel Security","Security","Soft Constraints"],"downloads":0},"search_terms":["modelling","detecting","cascade","vulnerability","problem","using","soft","constraints","bistarelli","foley","o'sullivan"],"keywords":["constraints","multilevel security","security","soft constraints"],"authorIDs":[]}