Fault trees for security system design and analysis

被引:73
作者
Brooke, PJ
Paige, RF
机构
[1] Univ Plymouth, Sch Comp, Network Res Grp, Plymouth PL4 8AA, Devon, England
[2] Univ York, Dept Comp Sci, York YO10 5DD, N Yorkshire, England
关键词
security; fault tree analysis;
D O I
10.1016/S0167-4048(03)00313-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The academic literature concerning fault tree analysis relates almost entirely to the design and development of safety-critical systems. This paper illustrates how similar techniques can be applied to the design and analysis of security-critical systems. The application of this technique is illustrated in an example,inspired by a current public-key cryptosystem.
引用
收藏
页码:256 / 264
页数:9
相关论文
共 15 条
[1]  
Anderson Ross., 2001, SECURITY ENG GUIDE B
[2]  
[Anonymous], 1999, DR DOBBS J
[3]  
[Anonymous], 1981, FAULT TREE HDB
[4]  
CHUGN L, 1993, LNCS, V685
[5]  
FRONCZAK EL, 1998, P 16 INT SYST SAF C
[6]  
HELMER G, 2001, 1 S REQ ENG INF SEC
[7]  
JURJENS J, 2002, P S APPL COMP SAC 20
[8]   Using CSP to detect errors in the TMN protocol [J].
Lowe, G ;
Roscoe, B .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1997, 23 (10) :659-669
[9]  
MCDERMOTT J, 1999, P COMPSAC 1999
[10]  
MCDERMOTT J, 2001, P COMP SEC APPL C 20