Reasoning about secure interoperation using soft constraints

被引:0
|
作者
Bistarelli, S [1 ]
Foley, SN [1 ]
O'Sullivan, B [1 ]
机构
[1] CNR, Ist Informat & Telemat, I-56100 Pisa, Italy
来源
关键词
secure interoperation; constraint satisfaction;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a constraint satisfaction problem.
引用
收藏
页码:173 / 186
页数:14
相关论文
共 50 条
  • [1] Optimized multi-domain secure interoperation using soft constraints
    Belsis, Petros
    Gritzalis, Stefanos
    Katsikas, Sokratis K.
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, 2006, 204 : 78 - +
  • [2] Possibility theory for reasoning about uncertain soft constraints
    Pini, MS
    Rossi, F
    Venable, B
    SYMBOLIC AND QUANTITATIVE APPROACHES TO REASONING WITH UNCERTAINTY, PROCEEDINGS, 2005, 3571 : 800 - 811
  • [3] Hard and soft constraints for reasoning about qualitative conditional preferences
    C. Domshlak
    S. Prestwich
    F. Rossi
    K. B. Venable
    T. Walsh
    Journal of Heuristics, 2006, 12 : 263 - 285
  • [4] Hard and soft constraints for reasoning about qualitative conditional preferences
    Domshlak, C
    Prestwich, S
    Rossi, F
    Venable, KB
    Walsh, T
    JOURNAL OF HEURISTICS, 2006, 12 (4-5) : 263 - 285
  • [5] REASONING ABOUT LINEAR CONSTRAINTS USING PARAMETRIC QUERIES
    HUYNH, T
    JOSKOWICZ, L
    LASSEZ, C
    LASSEZ, JL
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 472 : 1 - 20
  • [6] REASONING ABOUT SPATIAL CONSTRAINTS
    YOON, KB
    COYNE, RD
    ENVIRONMENT AND PLANNING B-PLANNING & DESIGN, 1992, 19 (03): : 243 - 266
  • [7] Reasoning about Connectivity Constraints
    Bessiere, Christian
    Hebrard, Emmanuel
    Katsirelos, George
    Walsh, Toby
    PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 2568 - 2574
  • [8] Reasoning with doubly uncertain soft constraints
    Yager, Ronald R.
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2011, 52 (04) : 554 - 561
  • [9] A novel secure interoperation system
    Jin, Li
    Lu, Zhengding
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 2, PROCEEDINGS, 2007, 4488 : 808 - +
  • [10] Computational issues in secure interoperation
    Li, G
    Qian, XL
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) : 43 - 52