Abstract | ||
---|---|---|
System security continues to be of increasing importance. To effectively address both natural and intentional threats to large systems, the threats must be cataloged and analyzed. Extremely large and complex systems can have an accordingly large number of threat scenarios. Simply listing the threats and devising countermeasures for each is ineffective and not efficient. We describe a threat cataloging methodology whereby a large number of threats can be efficiently cataloged and analyzed for common features. This allows countermeasures to be formulated that address a large number of threats that share common features. The methodology utilizes Multiple-Valued Logic for describing the state of a large system and a multiple-valued decision diagram (MDD) for the threat catalog and analysis. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/ISMVL.2011.12 | Multiple-Valued Logic |
Keywords | Field | DocType |
logic circuits,probability,large-complex systems,model system threat probabilities,multiple-valued logic decision diagrams,system security,threat cataloging methodology,Large System Security,MDD,Threat cataloging | Complex system,Boolean function,Countermeasure,Data structure,Logic gate,Computer security,Computer science,Model system,Influence diagram,Fault tree analysis | Conference |
ISSN | ISBN | Citations |
0195-623X E-ISBN : 978-0-7695-4405-2 | 978-0-7695-4405-2 | 17 |
PageRank | References | Authors |
0.99 | 11 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Theodore W. Manikas | 1 | 37 | 4.94 |
Mitchell A. Thornton | 2 | 280 | 40.94 |
David Y. Feinstein | 3 | 65 | 7.15 |