2015 13th Annual Conference on Privacy, Security and Trust (PST) 2015
DOI: 10.1109/pst.2015.7232969
|View full text |Cite
|
Sign up to set email alerts
|

Network security supported by arguments

Abstract: Argumentation has been proved as a simple yet powerful approach to manage conflicts in reasoning with the purpose to find subsets of "surviving" arguments. Our intent is to exploit such form of resolution to support the administration of security in complex systems, e.g., in case threat countermeasures are in conflict with non-functional requirements. The proposed formalisation is able to find the required security controls and explicitly provide arguments supporting this selection. Therefore, an explanation a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…[41] applied Defeasible Logic Programming (DeLP) for validation and reconfiguration of a firewall, while [14] used and argument-based logic programming engine to enforce security requirements dynamically. Similarly, [29] showed how to analyze security systems using abstract argumentation framework.…”
Section: Related Workmentioning
confidence: 99%
“…[41] applied Defeasible Logic Programming (DeLP) for validation and reconfiguration of a firewall, while [14] used and argument-based logic programming engine to enforce security requirements dynamically. Similarly, [29] showed how to analyze security systems using abstract argumentation framework.…”
Section: Related Workmentioning
confidence: 99%
“…Argumentation has also been explored as a cybersecurity tool [12] for helping making decisions where a balance has to be found between security, operability and cost. The main difference between this field and our framework is that arguments are not com-ments on a social network, but statements about system configuration, sensor data, etc.…”
Section: Introductionmentioning
confidence: 99%