Identifying critical components during information security evaluations


Autoria(s): Rae, Andrew; Fidge, Colin
Contribuinte(s)

S. Morris

Data(s)

01/01/2005

Resumo

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Identificador

http://espace.library.uq.edu.au/view/UQ:77812/UQ77812_OA.pdf

http://espace.library.uq.edu.au/view/UQ:77812

Idioma(s)

eng

Publicador

Australian Computer Society Inc.

Palavras-Chave #Computer Science, Information Systems #Computer Science, Software Engineering #C1 #291603 Input, Output and Data Devices #700302 Telecommunications
Tipo

Journal Article