A preliminary application of generalized fault trees to security

Risultato della ricerca: Capitolo in libro/report/atti di convegnoContributo a conferenzapeer review

Abstract

Fault trees (FT) are widespread models in the field of reliability, but they lack of modelling power. So, in the literature, several extensions have been proposed and introduced specific new modelling primitives. Attack trees (AT) have gained acceptance in the field of security. They follow the same notation of standard FT, but they represent the combinations of actions necessary for the success of an attack to a computing system. In this paper, we extend the AT formalism by exploiting the new primitives introduced in the FT extensions. This leads to more accurate models. The approach is applied to a case study: The AT is exploited to represent the attack mode and compute specific quantitative measures about the system security.

Lingua originaleInglese
Titolo della pubblicazione ospiteICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings
Pagine609-614
Numero di pagine6
Stato di pubblicazionePubblicato - 2013
Evento10th International Conference on Security and Cryptography, SECRYPT 2013 - Part of 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013 - Reykjavik, Iceland
Durata: 29 lug 201331 lug 2013

Serie di pubblicazioni

NomeICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings

???event.eventtypes.event.conference???

???event.eventtypes.event.conference???10th International Conference on Security and Cryptography, SECRYPT 2013 - Part of 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013
Paese/TerritorioIceland
CittàReykjavik
Periodo29/07/1331/07/13

Fingerprint

Entra nei temi di ricerca di 'A preliminary application of generalized fault trees to security'. Insieme formano una fingerprint unica.

Cita questo