Abstract
The Cascade Vulnerability Problem is a potential problem which must be faced when using the interconnected accredited system approach of the Trusted Network Interpretation. In this paper, we present the general Cascade vulnerability problem, describe the basic properties of the most important detection algorithms, and conduct a brief comparative analysis.
Chapter PDF
Similar content being viewed by others
References
Aho. A., Hoperoft J., Ullman J., (1974) The Design and Analysis of Computer Algorithms, Addison-Wesley, Reading, MA.
Department of Defence (1985) Trusted Computer System Evaluation Criteria,DOD 5200.28-STD.
Fitch J.A. III, Hoffman L.J., (1991) The Cascade problem: Graph Theory can help, Proceedings of the 14th National Computer Security Conference, pp. 88 – 100.
Fitch J.A. III, Hoffman L.J., (1993) A shortest path network security model, Computers and Security, Vol. 12, pp. 169 – 189.
Freund J. E., (1962) Mathematical Statistics, Prentice Hall, Englewood Cliffs, N.J.
Horton J.D., et al., (1993) The Cascade Vulnerability Problem, Journal of Computer Security, Vol. 2, No. 4, pp. 279 – 290.
Katsikas S., Spyrou T., Gritzalis D., Darzentas J., (1996) Model for network behaviour under viral attack, Computer Communications, Vol. 13, No. 2, pp. 124 – 132.
Lee T. M. P., (1989) Statistical models of trust: TCBs vs. People, Proceedings of the IEEE Symposium on Security and Privacy, pp. 10 – 19.
Madron T., (1990) Network Security in the 90’s, J. Wiley & Sons, Inc.
Millen J. K., Schwartz M.W., (1988) The Cascading problem for interconnected networks, Proceedings of the 4th Aerospace Computer Security Conference, pp. 269 – 273.
Millen J. K., (1990) Algorithm for the Cascading problem, in J.P.Anderson ed., Internet IEEE Cipher News Group,June 25 IEEE Cipher Forum on dockmaster.ncsc.mil .
National Computer Security Center, (1985) Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements, National Computer Security Center, USA.
National Computer Security Center, (1987) Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria, Red Book NCSC-TG-005, Library No. S228, 526, Version 1, National Computer Security Center, USA.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Gritzalis, S., Katsikas, S.K., Spinellis, D. (1997). The Cascade Vulnerability Problem for Open Distributed Systems: A Review. In: Gritzalis, D. (eds) Reliability, Quality and Safety of Software-Intensive Systems. IFIP — The International Federation for Information Processing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35097-4_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-35097-4_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6399-7
Online ISBN: 978-0-387-35097-4
eBook Packages: Springer Book Archive