Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints

  title={Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints},
  author={Stefano Bistarelli and Simon N. Foley and Barry O'Sullivan},
The security of a network configuration is based, not just on the security of its individual components and their direct interconnections, but it is also based on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for cascading paths that violate security, in a circuitous manner, across a network. In this paper we show how constraint programming provides a natural approach to expressing the necessary… CONTINUE READING
Highly Cited
This paper has 26 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 10 extracted citations

Semiring-based constraint models and frameworks for security-related scenarios

2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS) • 2012

An Overview of AI Research in Italy

Artificial Intelligence: An International Perspective • 2009

An Optimization Approach using Soft Constraints for the Cascade Vulnerability Problem

NAFIPS 2007 - 2007 Annual Meeting of the North American Fuzzy Information Processing Society • 2007

Research Directions in Data and Applications Security XVIII

IFIP International Federation for Information Processing • 2004


Publications referenced by this paper.
Showing 1-10 of 18 references

Practical applications of constraint programming

Constraints • 1996
View 3 Excerpts
Highly Influenced

Analysis of integrity policies using soft constraints

S. Bistarelli, H. Fargier, +3 authors G. Verfaillie
Proc . of IEEE Workshop Policies for Distributed Systems and Networks • 2003

CONSTRAINTS: An international journal

S. Bistarelli, U. Montanari, F. Rossi

Similar Papers

Loading similar papers…