15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (Ecbs 2008) 2008
DOI: 10.1109/ecbs.2008.13
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Model for Network-Wide Security Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…Second, probing is inaccurate, e.g., it cannot probe the open ports with no server listening on them. Due to these drawbacks of probing, many approaches were proposed to address the reachability problem [2], [11], [13], [18], [24], [26]. The main assumption in all these approaches is that the reachability restriction information of each network device and other configuration state are known to a central network analyst, who is quantifying the network reachability.…”
Section: B Limitation Of Prior Artmentioning
confidence: 99%
“…Second, probing is inaccurate, e.g., it cannot probe the open ports with no server listening on them. Due to these drawbacks of probing, many approaches were proposed to address the reachability problem [2], [11], [13], [18], [24], [26]. The main assumption in all these approaches is that the reachability restriction information of each network device and other configuration state are known to a central network analyst, who is quantifying the network reachability.…”
Section: B Limitation Of Prior Artmentioning
confidence: 99%
“…As the number of states is exponential to the number of links, the model checking faces the state explosion problem. More details can be approached in the paper [14].…”
Section: Model-checking Of Security Propertiesmentioning
confidence: 99%
“…The first construction of dynamic provable data possession was proposed by Erway et al [15] which use pdp extended model to achieve the required possession of data. Data using rank-based authenticated skip lists is updated, compared with cloud storage and computation which may receive less attention now days.…”
Section: International Journal Of Computer Applications (0975 -8887)mentioning
confidence: 99%