dc.contributor.author | Γκρίτζαλης, Στέφανος | el |
dc.contributor.author | Σπινέλλης, Διομήδης Δ. | el |
dc.date.accessioned | 2015-06-12T09:57:54Z | |
dc.date.available | 2015-06-12T09:57:54Z | |
dc.date.issued | 2015-06-12 | |
dc.identifier.uri | http://hdl.handle.net/11400/15799 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.source | http://www.sciencedirect.com/science/article/pii/S0141933198000647# | el |
dc.subject | risk analysis | |
dc.subject | Simulated annealing (Mathematics) | |
dc.subject | Cascade Vulnerability Problem | |
dc.subject | Network and open distributed systems security | |
dc.subject | Ασφάλειας ανοικτών κατανεμημένων συστημάτων δικτύου | |
dc.subject | Ανάλυση κινδύνου | |
dc.subject | Προσομοιωμένη ανόπτηση | |
dc.title | The Cascade Vulnerability Problem | en |
heal.type | journalArticle | |
heal.secondaryTitle | the detection problem and a simulated annealing approach for its correction | en |
heal.classification | Technology | |
heal.classification | Computer science | |
heal.classification | Τεχνολογία | |
heal.classification | Πληροφορική | |
heal.classificationURI | http://zbw.eu/stw/descriptor/10470-6 | |
heal.classificationURI | http://skos.um.es/unescothes/C00750 | |
heal.classificationURI | **N/A**-Τεχνολογία | |
heal.classificationURI | **N/A**-Πληροφορική | |
heal.keywordURI | http://lod.nal.usda.gov/136472 | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh88004495 | |
heal.identifier.secondary | doi:10.1016/S0141-9331(98)00064-7 | |
heal.language | en | |
heal.access | campus | |
heal.publicationDate | 1998-04-30 | |
heal.bibliographicCitation | Gritzalis, S. and Spinellis, D. (1998). The Cascade Vulnerability Problem: the detection problem and a simulated annealing approach for its correction. "Microprocessors and Microsystems", 21(10), 30 April 1998. pp. 621-627. Available from: http://www.sciencedirect.com/science/article/pii/S0141933198000647#. [Accessed 11/09/1998] | en |
heal.abstract | The Cascade Vulnerability Problem is a potential problem which must be faced when using the interconnected accredited system approach of the Trusted Network Interpretation. It belongs to a subset of the problem set that addresses the issue of whether the interconnection of secure systems via a secure channel results in a secure distributed system. The Cascade Vulnerability Problem appears when an adversary can take advantage of network connections to compromise information across a range of sensitivity levels that is greater than the accreditation range of any of the component systems s/he must defeat to do so. The general Cascade Vulnerability Problem is presented, the basic properties of the most important detection algorithms are described, a brief comparative analysis is conducted, and a new approach based on simulated annealing for its correction is presented. | en |
heal.journalName | Microprocessors and Microsystems | en |
heal.journalType | peer-reviewed | |
heal.fullTextAvailability | true |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: