Semiring-based constraint models and frameworks have been extensively used in literature to optimize different security-related metrics, in order to represent trust scores, levels of security and, in general, quantitative information on shared resources to be securely managed. In this tutorial, we summarize four approaches that show an application of these formal models to different security-related problems, as Access Control List-like rights, policy-based access with weighted credentials, propagation of trust on trust-networks, and the cascade vulnerability problem.

Semiring-based constraint models and frameworks for security-related scenarios

Bistarelli, Stefano;Santini, Francesco
2012

Abstract

Semiring-based constraint models and frameworks have been extensively used in literature to optimize different security-related metrics, in order to represent trust scores, levels of security and, in general, quantitative information on shared resources to be securely managed. In this tutorial, we summarize four approaches that show an application of these formal models to different security-related problems, as Access Control List-like rights, policy-based access with weighted credentials, propagation of trust on trust-networks, and the cascade vulnerability problem.
2012
9781467330879
9781467330886
9781467330893
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11391/1158900
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact