Automatic Generation of Security Argument Graphs.
Nils Ole TippenhauerWilliam G. TempleAn Hoa VuBinbin ChenDavid M. NicolZbigniew KalbarczykWilliam H. SandersPublished in: CoRR (2014)
Keyphrases
- information security
- access control
- security requirements
- security policies
- intrusion detection
- graph theory
- security issues
- network security
- automatically generate
- information assurance
- graph representation
- graph mining
- graph theoretic
- weighted graph
- security protocols
- security properties
- security problems
- graph matching
- graph model
- graph databases
- key management
- computer security
- graph construction
- security systems
- hypothetical reasoning