A method for automatically generating rules for a requires-provides security model of a system

作者: William Snow Orvis

DOI:

关键词:

摘要:

参考文章(6)
Sean Philip Peisert, Sidney Karin, A model of forensic analysis using goal-oriented logging University of California at San Diego. ,(2007)
Eugene H. Spafford, Daniel Farmer, The COPS Security Checker System USENIX Summer. pp. 165- 170 ,(1990)
J. G. Alfaro, N. Boulahia-Cuppens, F. Cuppens, Complete analysis of configuration rules to guarantee reliable network security policies International Journal of Information Security. ,vol. 7, pp. 103- 122 ,(2008) , 10.1007/S10207-007-0045-7
Paul Ammann, Duminda Wijesekera, Saket Kaushik, Scalable, graph-based network vulnerability analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 217- 224 ,(2002) , 10.1145/586110.586140
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J.M. Wing, Automated generation and analysis of attack graphs ieee symposium on security and privacy. pp. 273- 284 ,(2002) , 10.1109/SECPRI.2002.1004377
Yi-Dong Shen, Qiang Yang, Deriving a stationary dynamic bayesian network from a logic program with recursive loops inductive logic programming. ,vol. 3625, pp. 330- 347 ,(2005) , 10.1007/11536314_20