Matches in SemOpenAlex for { <https://semopenalex.org/work/W349523793> ?p ?o ?g. }
Showing items 1 to 68 of
68
with 100 items per page.
- W349523793 abstract "Security is a topic of ever increasing interest. Today it is widely accepted that, due to the unavoidable presence of vulnerabilities, design faults and administrative errors, an ICT system will never be totally secure. Connecting a system to a network will necessarily introduce a risk of inappropriate access resulting in disclosure, corruption and/or loss of information. Therefore, the security of a system should ideally be interpreted in a probabilistic manner. More specifically, there is an urgent need for modelling methods that provide operational measures of the security. Dependability, on the other hand, is the ability of a computer system to deliver service that can justifiably be trusted. In a dependability context one distinguishes between accidental faults, which are modelled as random processes, and intentional faults, i.e., attacks, which in most cases are not considered at all. A major drawback of this approach is that attacks may in many cases be the dominating failure source for today’s networked systems. The classical way of dependability evaluation can therefore be very deceptive: highly dependable systems may in reality fail much more frequently than expected, due to the exploitation from attackers. To be considered trustworthy, a system must be both dependable and secure. However, these two aspects have so far tended to be treated separately. A unified modelling framework for security and dependability evaluation would be advantageous from both points of view. The security community can benefit from the mature dependability modelling techniques, which can provide the operational measures that are so desirable today. On the other hand, by adding hostile actions to the set of possible fault sources, the dependability community will be able to make more realistic models than the ones that are currently in use. This thesis proposes a stochastic modeling approach, which can be used to predict a system’s security and dependability behavior. As will be seen, the basic model has a number of possible applications. For example, it can be used as a tool for trade-off analysis of security countermeasures, or it can be used as a basis for real-time assessment of the system trustworthiness." @default.
- W349523793 created "2016-06-24" @default.
- W349523793 creator A5006327300 @default.
- W349523793 creator A5072838481 @default.
- W349523793 date "2004-01-01" @default.
- W349523793 modified "2023-10-10" @default.
- W349523793 title "Using Game Theory in Stochastic Models for Quantifying Security" @default.
- W349523793 hasPublicationYear "2004" @default.
- W349523793 type Work @default.
- W349523793 sameAs 349523793 @default.
- W349523793 citedByCount "15" @default.
- W349523793 countsByYear W3495237932012 @default.
- W349523793 countsByYear W3495237932013 @default.
- W349523793 countsByYear W3495237932014 @default.
- W349523793 crossrefType "journal-article" @default.
- W349523793 hasAuthorship W349523793A5006327300 @default.
- W349523793 hasAuthorship W349523793A5072838481 @default.
- W349523793 hasConcept C112930515 @default.
- W349523793 hasConcept C115903868 @default.
- W349523793 hasConcept C140547941 @default.
- W349523793 hasConcept C144133560 @default.
- W349523793 hasConcept C151730666 @default.
- W349523793 hasConcept C154945302 @default.
- W349523793 hasConcept C2779343474 @default.
- W349523793 hasConcept C38652104 @default.
- W349523793 hasConcept C41008148 @default.
- W349523793 hasConcept C49937458 @default.
- W349523793 hasConcept C77019957 @default.
- W349523793 hasConcept C86803240 @default.
- W349523793 hasConceptScore W349523793C112930515 @default.
- W349523793 hasConceptScore W349523793C115903868 @default.
- W349523793 hasConceptScore W349523793C140547941 @default.
- W349523793 hasConceptScore W349523793C144133560 @default.
- W349523793 hasConceptScore W349523793C151730666 @default.
- W349523793 hasConceptScore W349523793C154945302 @default.
- W349523793 hasConceptScore W349523793C2779343474 @default.
- W349523793 hasConceptScore W349523793C38652104 @default.
- W349523793 hasConceptScore W349523793C41008148 @default.
- W349523793 hasConceptScore W349523793C49937458 @default.
- W349523793 hasConceptScore W349523793C77019957 @default.
- W349523793 hasConceptScore W349523793C86803240 @default.
- W349523793 hasLocation W3495237931 @default.
- W349523793 hasOpenAccess W349523793 @default.
- W349523793 hasPrimaryLocation W3495237931 @default.
- W349523793 hasRelatedWork W1517532457 @default.
- W349523793 hasRelatedWork W1548420541 @default.
- W349523793 hasRelatedWork W1964439345 @default.
- W349523793 hasRelatedWork W1968909445 @default.
- W349523793 hasRelatedWork W201967721 @default.
- W349523793 hasRelatedWork W2045006695 @default.
- W349523793 hasRelatedWork W2045814518 @default.
- W349523793 hasRelatedWork W2108376255 @default.
- W349523793 hasRelatedWork W2117210791 @default.
- W349523793 hasRelatedWork W2128625988 @default.
- W349523793 hasRelatedWork W2132704120 @default.
- W349523793 hasRelatedWork W2141289698 @default.
- W349523793 hasRelatedWork W2146949683 @default.
- W349523793 hasRelatedWork W2152473397 @default.
- W349523793 hasRelatedWork W2159443917 @default.
- W349523793 hasRelatedWork W2170038998 @default.
- W349523793 hasRelatedWork W2502082844 @default.
- W349523793 hasRelatedWork W2575731723 @default.
- W349523793 hasRelatedWork W2612270411 @default.
- W349523793 hasRelatedWork W306251775 @default.
- W349523793 isParatext "false" @default.
- W349523793 isRetracted "false" @default.
- W349523793 magId "349523793" @default.
- W349523793 workType "article" @default.