Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy
DOI: 10.1109/risp.1993.287638
|View full text |Cite
|
Sign up to set email alerts
|

The cascade vulnerability problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(21 citation statements)
references
References 4 publications
0
21
0
Order By: Relevance
“…As in [15,13,3,4], we assume that data security levels are totally ordered. Hence, the users cleared at a security level can read all data labeled with the same or a lower security level.…”
Section: Definitions and Notationmentioning
confidence: 99%
See 4 more Smart Citations
“…As in [15,13,3,4], we assume that data security levels are totally ordered. Hence, the users cleared at a security level can read all data labeled with the same or a lower security level.…”
Section: Definitions and Notationmentioning
confidence: 99%
“…The notion of information flow graph is very useful in the study of Cascade Vulnerability Detection and Correction (e.g., [15,14]). In the following, we always use the terms node and link to refer to elements of the interconnection network and the term vertex and arc to refer to the elements of the information flow graph.…”
Section: Definitions and Notationmentioning
confidence: 99%
See 3 more Smart Citations