Risk Assessment as an Argumentation Game

作者: Henry Prakken , Dan Ionita , Roel Wieringa

DOI: 10.1007/978-3-642-40624-9_22

关键词:

摘要: This paper explores the idea that IT security risk assessment can be formalized as an argumentation game in which assessors argue about how system attacked by a threat agent and defended assessors. A architecture plus assumptions environment is specified ASPIC + theory, argument defined for exchanging arguments between hypothetical agents whether specification satisfies given requirement. Satisfaction always partial involves of The dynamic players both add elements to delete from specification. shown respect underlying logic any logically completed 'won' defender, requirement justified conclusion at stage game.

参考文章(18)
Henry Prakken, Sanjay Modgil, Reasoning about Preferences in Structured Extended Argumentation Frameworks computational models of argument. pp. 347- 358 ,(2010)
Ketil Stlen, Mass Soldal Lund, Bjrnar Solhaug, Model-Driven Risk Analysis: The CORAS Approach ,(2010)
Arosha K. Bandara, Antonis Kakas, Emil C. Lupu, Alessandra Russo, Using argumentation logic for firewall policy specification and analysis distributed systems operations and management. pp. 185- 196 ,(2006) , 10.1007/11907466_16
Ronald P. Loui, Process and Policy: Resource-Bounded NonDemonstrative Reasoning computational intelligence. ,vol. 14, pp. 1- 38 ,(1998) , 10.1111/0824-7935.00055
Henry Prakken, An abstract framework for argumentation with structured arguments Argument & Computation. ,vol. 1, pp. 93- 124 ,(2010) , 10.1080/19462160903564592
PAUL KRAUSE, JOHN FOX, PHILIP JUDSON, An argumentation-based approach to risk assesment Ima Journal of Management Mathematics. ,vol. 5, pp. 249- 263 ,(1993) , 10.1093/IMAMAN/5.1.249
Sanjay Modgil, Henry Prakken, A general account of argumentation with preferences Artificial Intelligence. ,vol. 195, pp. 361- 397 ,(2013) , 10.1016/J.ARTINT.2012.10.008
C.B. Haley, R. Laney, J.D. Moffett, B. Nuseibeh, Security Requirements Engineering: A Framework for Representation and Analysis IEEE Transactions on Software Engineering. ,vol. 34, pp. 133- 153 ,(2008) , 10.1109/TSE.2007.70754
Sjouke Mauw, Martijn Oostdijk, Foundations of Attack Trees Information Security and Cryptology - ICISC 2005. pp. 186- 198 ,(2006) , 10.1007/11734727_17