The Inference Graph of Cybersecurity Rules
Paper
Paper/Presentation Title | The Inference Graph of Cybersecurity Rules |
---|---|
Presentation Type | Paper |
Authors | Sheniar, Dawood, Hadaad, Nabeel and Addie Ron |
Journal or Proceedings Title | Proceedings of the 29th International Telecommunication Networks and Applications Conference (ITNAC 2019) |
Article Number | 9077958 |
Number of Pages | 6 |
Year | 2016 |
Publisher | IEEE (Institute of Electrical and Electronics Engineers) |
Place of Publication | New Zealand |
ISSN | 2474-154X |
2474-1531 | |
ISBN | 9781728136738 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/ITNAC46935.2019.9077958 |
Web Address (URL) of Paper | https://ieeexplore.ieee.org/document/9077958 |
Web Address (URL) of Conference Proceedings | https://ieeexplore.ieee.org/xpl/conhome/9068186/proceeding |
Conference/Event | 29th International Telecommunication Networks and Applications Conference (ITNAC 2019) |
Event Details | 29th International Telecommunication Networks and Applications Conference (ITNAC 2019) Parent IEEE International Telecommunication Networks and Applications Conference Event Date 27 to end of 29 Nov 2019 Event Location Auckland, New Zealand |
Abstract | The concept that cybersecurity architecture is the discovery, definition and validation of rules is introduced. The new concept of inference graphs for illustrating the relationship between cybersecurity rules is defined. Three increasingly complex examples of inference graphs for systems needing cybersecurity architecture are presented, including the detailed proofs which form the basis of these inference graphs, in some cases. The software which has been developed to support the development and use of cybersecurity inference graphs is described including details of the public server where it can be used. It is shown that cybersecurity inference graphs can significantly contribute to development of, and validation of cybersecurity and also that rigorous validation of cybersecurity is not necessarily as difficult as previously thought. |
Keywords | cybersecurity architecture; Cybersecurity rules; inference graph; Netml; proof; security design; stakeholder security analysis |
Contains Sensitive Content | Does not contain sensitive content |
ANZSRC Field of Research 2020 | 460406. Software and application security |
Public Notes | File reproduced in accordance with the copyright policy of the publisher/author. |
Byline Affiliations | University of Southern Queensland |
School of Mathematics, Physics and Computing |
https://research.usq.edu.au/item/wxxyy/the-inference-graph-of-cybersecurity-rules
Download files
47
total views37
total downloads3
views this month4
downloads this month