Identifying critical components during information security evaluations
Contribuinte(s) |
S. Morris |
---|---|
Data(s) |
01/01/2005
|
Resumo |
Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth. |
Identificador |
http://espace.library.uq.edu.au/view/UQ:77812/UQ77812_OA.pdf |
Idioma(s) |
eng |
Publicador |
Australian Computer Society Inc. |
Palavras-Chave | #Computer Science, Information Systems #Computer Science, Software Engineering #C1 #291603 Input, Output and Data Devices #700302 Telecommunications |
Tipo |
Journal Article |