Fault trees for security system design and analysis

Hdl Handle:
http://hdl.handle.net/10149/58291
Title:
Fault trees for security system design and analysis
Authors:
Brooke, P. J. (Phillip); Paige, R. F. (Richard)
Affiliation:
University of Plymouth. School of Computing; University of York. Department of Computer Science.
Citation:
Brooke, P. J. and Paige, R. F. (2003) 'Fault trees for security system design and analysis', Computers & Security, 22 (3), pp.256-264.
Publisher:
Elsevier
Journal:
Computers & Security
Issue Date:
Apr-2003
URI:
http://hdl.handle.net/10149/58291
DOI:
10.1016/S0167-4048(03)00313-4
Additional Links:
http://dx.doi.org/10.1016/s0167-4048(03)00313-4
Abstract:
The academic literature concerning fault tree analysis relates almost entirely to the design and development of safety-critical systems. This paper illustrates how similar techniques can be applied to the design and analysis of security-critical systems. The application of this technique is illustrated in an example inspired by a current public-key cryptosystem.
Type:
Article
Keywords:
security; fault tree analysis; fault tree
ISSN:
0167-4048
Rights:
Author can archive post-print (ie final draft post-refereeing). For full details see http://www.sherpa.ac.uk/romeo/ [Accessed 06/01/2010]
Citation Count:
15 [Scopus, 06/01/2010]

Full metadata record

DC FieldValue Language
dc.contributor.authorBrooke, P. J. (Phillip)-
dc.contributor.authorPaige, R. F. (Richard)-
dc.date.accessioned2009-04-01T10:48:11Z-
dc.date.available2009-04-01T10:48:11Z-
dc.date.issued2003-04-
dc.identifier.citationComputers & Security; 22 (3): 256-264-
dc.identifier.issn0167-4048-
dc.identifier.doi10.1016/S0167-4048(03)00313-4-
dc.identifier.urihttp://hdl.handle.net/10149/58291-
dc.description.abstractThe academic literature concerning fault tree analysis relates almost entirely to the design and development of safety-critical systems. This paper illustrates how similar techniques can be applied to the design and analysis of security-critical systems. The application of this technique is illustrated in an example inspired by a current public-key cryptosystem.-
dc.publisherElsevier-
dc.relation.urlhttp://dx.doi.org/10.1016/s0167-4048(03)00313-4-
dc.rightsAuthor can archive post-print (ie final draft post-refereeing). For full details see http://www.sherpa.ac.uk/romeo/ [Accessed 06/01/2010]-
dc.subjectsecurity-
dc.subjectfault tree analysis-
dc.subjectfault tree-
dc.titleFault trees for security system design and analysis-
dc.typeArticle-
dc.contributor.departmentUniversity of Plymouth. School of Computing; University of York. Department of Computer Science.-
dc.identifier.journalComputers & Security-
ref.assessmentRAE 2008-
ref.citationcount15 [Scopus, 06/01/2010]-
or.citation.harvardBrooke, P. J. and Paige, R. F. (2003) 'Fault trees for security system design and analysis', Computers & Security, 22 (3), pp.256-264.-
All Items in TeesRep are protected by copyright, with all rights reserved, unless otherwise indicated.