首页> 外文会议>ACM Annual Symposium on Applied Computing >Modelling and Detecting the Cascade Vulnerability Problem using Soft Constraints
【24h】

Modelling and Detecting the Cascade Vulnerability Problem using Soft Constraints

机译:使用软限制建模和检测级联漏洞问题

获取原文

摘要

Establishing network security is based not just on the security of its component systems but also on how they are configured to interoperate. In this paper we consider how soft constraints provide an approach to detecting the cascade vulnerability problem: whether system interoperation provides circuitous or cascading routes across the network that increase the risk of violation of multilevel security. Taking the constraints approach means that we are building on techniques that have proven success in solving large-scale problems from other domains.
机译:建立网络安全性不仅基于其组件系统的安全性,还基于它们的安全性,而且还要对它们配置为互操作的安全性。 在本文中,我们考虑软限制如何提供检测级联漏洞问题的方法:系统互操作是否在网络上提供了违反多级安全性的风险的迂回或级联路由。 采取约束方法意味着我们正在建立在解决来自其他领域的大规模问题方面取得成功的技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号