1994
DOI: 10.1007/978-1-4471-3225-7_3
|View full text |Cite
|
Sign up to set email alerts
|

Dimensions of Active Behaviour

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
2

Year Published

1995
1995
2011
2011

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(13 citation statements)
references
References 13 publications
0
10
0
2
Order By: Relevance
“…Figure 3 shows the attack pattern representation for this attack scenario. For the second sub-step of the refinement, we make the use of the event-condition-action (ECA) rule, proposed initially to represent active databases [6]. The ECA rule is used to represent the attack pattern elements of Figure 3 into a sequence of steps that must be carried out by the tool.…”
Section: Refine the Attacks Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 3 shows the attack pattern representation for this attack scenario. For the second sub-step of the refinement, we make the use of the event-condition-action (ECA) rule, proposed initially to represent active databases [6]. The ECA rule is used to represent the attack pattern elements of Figure 3 into a sequence of steps that must be carried out by the tool.…”
Section: Refine the Attacks Scenariosmentioning
confidence: 99%
“…Copyright 2011 ACM 978-1-4503-1020-8/11/11...$10.00. pattern [5], event-condition-action (ECA) rules [6], and UML elements, and then converted to executable attack scripts for the testing tools. Experiments were performed using real attacks of the protocol such as Cipher Suite Rollback attack and Denial of Service (DoS) attacks.…”
Section: Introductionmentioning
confidence: 99%
“…We proposed the use of active rules [13] to convert the attack pattern elements into a notation that represent the sequence that must be carried out by the fault injector. Active rules are of the form: <trigger, condition, action>.…”
Section: • Step 5: Refine Attacks Scenariosmentioning
confidence: 99%
“…We will not elaborate further on the behavioral dimensions of ECA triggers [PDW+93] such as coupling modes, conflict resolution, etc. We consider a simple ECA trigger execution model (as shown in [WC96b], p. 17).…”
Section: Execution Modelmentioning
confidence: 99%
“…In [BW97a], we have introduced the concept of fuzzy event and proposed a trigger model dealing with it. Another important issue to study is the inter-relationship between the proposed fuzzy concepts and other behavioral dimensions of active database systems [PDW+93] like coupling modes, termination, etc.…”
Section: Future Workmentioning
confidence: 99%