Abstract | ||
---|---|---|
In this paper, a novel system level methodology for evaluating functionalities of network systems within general security model is introduced and formalized. We first decompose the entire system into a collection of subsystems each associated with a functionality; Thereafter, a new model for evaluating security properties of individual subsystem is built, which in- tends to implement a functionality by allowing an adversary to learn information and obtain knowledge from the correspondent subsystem via oracle queries; We further define evaluation and security metrics for security qualifications which is shown to be complete and robust within our model. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1109/WCNC.2006.1683542 | WCNC |
Keywords | Field | DocType |
hardware,evaluation function,network security,history,security model,stochastic processes,computer security,robustness,cyber security,internet,frequency,information security,availability | Computer security,Computer science,Computer network,Oracle,Information security,Robustness (computer science),Turing,Adversary,Computer security model,The Internet,System level | Conference |
Volume | ISSN | ISBN |
2 | 1525-3511 E-ISBN : 1-4244-0270-0 | 1-4244-0270-0 |
Citations | PageRank | References |
1 | 0.40 | 15 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Huafei Zhu | 1 | 181 | 28.38 |
Chunxiao Chigan | 2 | 195 | 20.62 |
Feng Bao | 3 | 1 | 0.74 |