Towards modelling information security with key-challenge Petri nets

6Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Our global information society is based on distributed wide-area networks. Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network-accessible resources from unauthorized access, as well as continuous monitoring and measurement of the network security's effectiveness. In this paper, we describe the use of Petri nets in modelling network security. We propose a new hierarchical method for modelling network attacks and evaluating effectiveness of the corresponding defences. Our model is called Key-Challenge Petri Net (KCPN). © Springer-Verlag 2009.

Cite

CITATION STYLE

APA

Kiviharju, M., Venäläinen, T., & Kinnunen, S. (2009). Towards modelling information security with key-challenge Petri nets. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5838 LNCS, pp. 190–206). https://doi.org/10.1007/978-3-642-04766-4_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free