Show simple item record

dc.contributor.authorLi, Chaomingen_US
dc.contributor.authorWang, Kewenen_US
dc.contributor.editorLi Wenzhengen_US
dc.date.accessioned2017-05-03T12:41:20Z
dc.date.available2017-05-03T12:41:20Z
dc.date.issued2010en_US
dc.date.modified2011-03-24T06:48:58Z
dc.identifier.refurihttp://www.icsess.org/en_AU
dc.identifier.doi10.1109/ICSESS.2010.5552302en_AU
dc.identifier.urihttp://hdl.handle.net/10072/37748
dc.description.abstractContinuous time Markov chains (CTMCs) have been used in real-time dependability and security analysis. However, existing approaches assume that the system is fully observable to a system attacker, which is not feasible for current large network systems. In this paper, we present a frame to model and specify the knowledge of attacker with partial observations. Firstly, we combine CTMCs and interpretation system as basic model. Then, a logic is defined to specify the knowledge for agents in the stochastic model. Further, we discuss the properties under different assumption for the model and agent. Finally, we present the model checking algorithms with a particular assumption and apply the frame to model the knowledge of attacker in intrusiontolerant system.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherIEEEen_US
dc.publisher.placeUnited Statesen_US
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofconferencenameInternational Conference on Software Engineering and Service Sciences, (ICSESS)en_US
dc.relation.ispartofconferencetitleProceedings 2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESSen_US
dc.relation.ispartofdatefrom2010-07-16en_US
dc.relation.ispartofdateto2010-07-18en_US
dc.relation.ispartoflocationBeijing, Chinaen_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchComputer Software not elsewhere classifieden_US
dc.subject.fieldofresearchcode080399en_US
dc.titleA logic-based frame for knowledge reasoning in real-time security analysisen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.date.issued2010
gro.hasfulltextNo Full Text


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record