Citations
The paper
has been cited by the following works.
- Spyros Kokolakis,
Dimitris Gritzalis, and Sokratis Katsikas.
Generic security policies for healthcare information systems.
Health Informatics Journal, 4(3):184–195, 1999.
- S. N. Foley.
Conduit cascades and
secure synchronization.
In ACM New Security Paradigms Workshop, pages 141–150. ACM, ACM
Press, September 2000.
- J. D. Horton.
Detecting cascade vulnerability problem in linear time.
Technical report, University of New Brunswick, Canada, July 2000.
Technical Report TR00-136.
- (Author
names in Chinese).
Survey on the theories
and methods of formal analyses for security protocols.
Journal of the Graduate School of the Chinese Academy of Sciences,
20(4):389–405, 2003.
In Chinese.
- S. Bistarelli,
S.N. Foley, and B. O'Sullivan.
Detecting and eliminating the cascade vulnerability problem from multilevel
security networks using soft constraints.
In Proceedings of the National Conference on Artificial
Intelligence, pages 808–813, 2004.
- (Author
names in Chinese).
A security model of
e-commerce based on internet agent.
Microcomputer Applications, 21(1):4–16, 2005.
In Chinese.
- S. Bistarelli,
S.N. Foley, and B. O'Sullivan.
A soft constraint-based approach to the cascade vulnerability problem.
Journal of Computer Security, 13(5):699–720, 2005.
- C. Servin,
M. Ceberio, E. Freudenthal, and S. Bistarelli.
An optimization approach using soft constraints for the cascade vulnerability
problem.
In Annual Conference of the North American Fuzzy Information Processing
Society — NAFIPS, pages 372–377, 2007.
(doi:10.1109/NAFIPS.2007.383867)
- S. Bashar and Z. Ding.
Optimum routing protection against cumulative eavesdropping in multihop
wireless networks.
In Proceedings - IEEE Military Communications Conference MILCOM,
2009.
(doi:10.1109/MILCOM.2009.5379981)
- R. Sitzenfrei,
M. Mair, , and W. Rauch.
Cascade vulnerability for risk analysis of water infrastructure.
Water Science and Technology, 64(9):1885–1891, 2011.
(doi:10.2166/wst.2011.813)
- B. Zhou,
D. Llewellyn-Jones, D. Lamb, M. Asim, Q. Shi, and M. Merabti.
A heuristic approach for secure service composition adaptation.
In Cyberpatterns: Unifying Design Patterns with Security and Attack
Patterns, pages 97–105. Springer International Publishing, 2014.
(doi:10.1007/978-3-319-04447-7_8)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.