Soft Constraints for Security

نویسندگان

  • Giampaolo Bella
  • Stefano Bistarelli
  • Simon N. Foley
چکیده

Integrity policies and cryptographic protocols have much in common. They allow for a number of participating principals, and consist of sets of rules controlling the actions that principals should or should not perform. They are intended to uphold various security properties, the crucial ones being integrity, confidentiality and authentication. This paper takes a unified view to the analysis of integrity policies and cryptographic protocols: they are artifacts that must be designed to be sufficiently robust to attack given an understood threat model. For example, integrity policy rules provide resilience to the threat of internal fraud, while cryptographic protocols provide resilience to the threat of replay and related attacks. The framework is modelled using (soft) constraints and analysis corresponds to the soft constraint satisfaction problem. Soft constraints facilitate a quantitative approach to analyzing integrity, confidentiality and authentication. Examples will be given: an integrity policy may achieve different levels of integrity under different circumstances; a protocol message may enjoy different levels of confidentiality for different principals; a principal can achieve different levels of authentication with different principals.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بهینه سازی برنامه ریزی هفتگی دروس دانشگاهی با روشهای جستجوی محلی

University course timetabling problem is a complicated problem and finding a computer-aided solution for it was a subject to work for many years. To solve this problem, we must assign courses to timeslots with respect to hard and soft constraints. Hard constraints are those which must be necessarily met (some of them could be neglected with high costs). Our aim is to meet as many soft constrain...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints

The security of a network configuration is based, not just on the security of its individual components and their direct interconnections, but it is also based on the potential for systems to inter-operate indirectly across network routes. Such inter-operation has been shown to provide the potential for cascading paths that violate security, in a circuitous manner, across a network. In this pap...

متن کامل

A soft constraint-based approach to the cascade vulnerability problem

The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for cascading paths that violate security, in a circuitous manner, across a network. In this paper we show how ...

متن کامل

Constraints Analysis of Poultry Production at Dzongu Area of North Sikkim in India

A study was conducted at five villages of Dzongu, North Sikkim in India to identify various constraints faced by the farmers during poultry production. Selection of respondents of poultry farmers was done on the basis of Simple Random Techniques. The data were collected from each respondent through structured questionnaire as well as self observations. The study indicated that the input (82.25%...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electr. Notes Theor. Comput. Sci.

دوره 142  شماره 

صفحات  -

تاریخ انتشار 2006