2015
DOI: 10.1007/978-3-319-17016-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Metric for Security Activities Assisted by Argumentative Logic

Abstract: Abstract. Recent security concerns related to future embedded systems make enforcement of security requirements one of the most critical phases when designing such systems. This paper introduces an approach for efficient enforcement of security requirements based on argumentative logic, especially reasoning about activation or deactivation of different security mechanisms under certain functional and non-functional requirements. In this paper, the argumentative logic is used to reason about the rationale behin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 8 publications
(10 reference statements)
0
4
0
Order By: Relevance
“…In [9], this work was extended to automatically generate firewall policies from higher-level requirements; and in previous work, we [6,42] have discussed how to use argumentation to handle firewall anomalies and, more generally, to address cyber-security. [41] applied Defeasible Logic Programming (DeLP) for validation and reconfiguration of a firewall, while [14] used and argument-based logic programming engine to enforce security requirements dynamically. Similarly, [29] showed how to analyze security systems using abstract argumentation framework.…”
Section: Related Workmentioning
confidence: 99%
“…In [9], this work was extended to automatically generate firewall policies from higher-level requirements; and in previous work, we [6,42] have discussed how to use argumentation to handle firewall anomalies and, more generally, to address cyber-security. [41] applied Defeasible Logic Programming (DeLP) for validation and reconfiguration of a firewall, while [14] used and argument-based logic programming engine to enforce security requirements dynamically. Similarly, [29] showed how to analyze security systems using abstract argumentation framework.…”
Section: Related Workmentioning
confidence: 99%
“…Jose-Miguel Horcas [23], defined an approach called INTER-TRUST framework to maintain the correlation between the security policies that need to be enforced, the security aspects that are deployed in order to enforce those security policies approach has been integrated. This framework has been validated in pervasive systems field, however, it can also be applied to many other types of systems.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…The work in [17] introduces an approach for the enforcement of security requirements based on argumentative logic; the aim is to reason about activation or deactivation of different security mechanisms under certain functional and non-functional requirements. The framework is applied to an automotive on-board system.…”
Section: Related Workmentioning
confidence: 99%
“…The framework is applied to an automotive on-board system. Differently from this work, in [17] the authors take advantage of Argument-based Logic Programming (see [2,Ch. 8]), and not Abstract Argumentation (see Sec.…”
Section: Related Workmentioning
confidence: 99%