Title :
The cascade vulnerability problem
Author :
Horton, J.D. ; Harland, Robert ; Ashby, Elton ; Cooper, R.H. ; Hyslop, W.F. ; Nickerson, B.G. ; Stewart, W.M. ; Ward, O.K.
Author_Institution :
Fac. of Comput. Sci., New Brunswick Univ., Fredericton, NB, USA
Abstract :
A cascade problem exists in a network of computers when data of a security level d can be passed to a user with a lower security clearance u elsewhere on the network without having to defeat any single component of the system that has an accreditation range great enough to allow users of level u and data of level d on a single system. An algorithm of time complexity O(an 3) and space complexity O(an2 ) is given to solve the cascade detection problem. Also, the cascade correction problem, to remove all cascading paths from a network for a given cost, under restrictive conditions is shown to be NP-complete
Keywords :
computational complexity; computer networks; security of data; NP-complete; cascade correction problem; cascade detection problem; cascade vulnerability problem; computer network; cost; security clearance; security level; space complexity; time complexity; Accreditation; Ambient intelligence; Books; Computer networks; Computer science; Computer security; Costs; Data security; Information security; Protection;
Conference_Titel :
Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-3370-0
DOI :
10.1109/RISP.1993.287638