• myGriffith
    • Staff portal
    • Contact Us⌄
      • Future student enquiries 1800 677 728
      • Current student enquiries 1800 154 055
      • International enquiries +61 7 3735 6425
      • General enquiries 07 3735 7111
      • Online enquiries
      • Staff phonebook
    View Item 
    •   Home
    • Griffith Research Online
    • Conference outputs
    • View Item
    • Home
    • Griffith Research Online
    • Conference outputs
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

  • All of Griffith Research Online
    • Communities & Collections
    • Authors
    • By Issue Date
    • Titles
  • This Collection
    • Authors
    • By Issue Date
    • Titles
  • Statistics

  • Most Popular Items
  • Statistics by Country
  • Most Popular Authors
  • Support

  • Contact us
  • FAQs
  • Admin login

  • Login
  • A logic-based frame for knowledge reasoning in real-time security analysis

    Author(s)
    Li, Chaoming
    Wang, Kewen
    Griffith University Author(s)
    Wang, Kewen
    Year published
    2010
    Metadata
    Show full item record
    Abstract
    Continuous time Markov chains (CTMCs) have been used in real-time dependability and security analysis. However, existing approaches assume that the system is fully observable to a system attacker, which is not feasible for current large network systems. In this paper, we present a frame to model and specify the knowledge of attacker with partial observations. Firstly, we combine CTMCs and interpretation system as basic model. Then, a logic is defined to specify the knowledge for agents in the stochastic model. Further, we discuss the properties under different assumption for the model and agent. Finally, we present ...
    View more >
    Continuous time Markov chains (CTMCs) have been used in real-time dependability and security analysis. However, existing approaches assume that the system is fully observable to a system attacker, which is not feasible for current large network systems. In this paper, we present a frame to model and specify the knowledge of attacker with partial observations. Firstly, we combine CTMCs and interpretation system as basic model. Then, a logic is defined to specify the knowledge for agents in the stochastic model. Further, we discuss the properties under different assumption for the model and agent. Finally, we present the model checking algorithms with a particular assumption and apply the frame to model the knowledge of attacker in intrusiontolerant system.
    View less >
    Conference Title
    Proceedings 2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESS
    DOI
    https://doi.org/10.1109/ICSESS.2010.5552302
    Subject
    Software engineering not elsewhere classified
    Publication URI
    http://hdl.handle.net/10072/37748
    Collection
    • Conference outputs

    Footer

    Disclaimer

    • Privacy policy
    • Copyright matters
    • CRICOS Provider - 00233E
    • TEQSA: PRV12076

    Tagline

    • Gold Coast
    • Logan
    • Brisbane - Queensland, Australia
    First Peoples of Australia
    • Aboriginal
    • Torres Strait Islander