Our global information society is based on distributed wide-area networks. Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network-accessible resources from unauthorized access, as well as continuous monitoring and measurement of the network security's effectiveness. In this paper, we describe the use of Petri nets in modelling network security. We propose a new hierarchical method for modelling network attacks and evaluating effectiveness of the corresponding defences. Our model is called Key-Challenge Petri Net (KCPN). © Springer-Verlag 2009.
CITATION STYLE
Kiviharju, M., Venäläinen, T., & Kinnunen, S. (2009). Towards modelling information security with key-challenge Petri nets. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5838 LNCS, pp. 190–206). https://doi.org/10.1007/978-3-642-04766-4_14
Mendeley helps you to discover research relevant for your work.