Loading...
Search for: taherian--m
0.005 seconds

    Vulnerability analysis in VGBPS using prolog

    , Article 2nd IPM International Symposium on Fundamentals of Software Engineering, FSEN 2007, Tehran, 17 April 2007 through 19 April 2007 ; Volume 4767 LNCS , 2007 , Pages 404-411 ; 03029743 (ISSN); 9783540756972 (ISBN) Rafiei, M. E ; Taherian, M ; Mousavi, H ; Movaghar, A ; Jalili, R ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Vulnerabilities are now part of all software systems. To handle vulnerabilities, many approaches have been proposed till now. Many of these approaches try to analyze vulnerabilities based on model checking techniques. However, the models used in these approaches handle authorized and unauthorized rules separately. This basically cause in weaker modeling abilities and consequently weaker vulnerability analysis. From authorized and unauthorized rules, we mean those emanated from access control model and those originated from vulnerabilities respectively. Currently, a new general graph-based protection system concentrating on vulnerabilities called VGBPS is proposed to overcome the mentioned...