Algorithm for searching bridges of specified types in the protection graph for Take-Grant protection model

نویسنده

  • Denis Brechka
چکیده

The article contains the algorithm for searching a certain kind of bridges in the protection graph of Take-Grant model. The proposed algorithm is based on a classical breadth-first search algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Theft and Conspiracy in the Take-Grant Protection Model

Models of protection in computer systems usually possess two components: a finite, labeled, directed two color graph representing the protection state of an operating system and a finite set of graph transformation rules with which the protection state may be changed. Harrison et al. demonstrated [ 1 ] that the safety problem for a very general protection model is undecidable; i.e., no algorith...

متن کامل

OPTIMALIZATION PHASE USING GRAPH MODELLING FOR RELIABLE BUILDING COMPLEXES

During the planning phase of modern, complex, block-structured, large-area located, but still landscape-harmonized health-care buildings, the key is the optimal positioning of the blocks and functions, simultaneously ensuring the most-effective backup-paths for any transportation route failure in the buildings in order to speed up system operation, reduce maintenance costs and especially to imp...

متن کامل

Power Differential based Wide Area Protection

Current differential based wide area protection (WAP) has recently been proposed as a technique to increase the reliability of protection systems. It increases system stability and can prevent large contingencies such as cascading outages and blackouts. This paper describes how power differential protection (PDP) can be used within a WAP and shows that the algorithm operates correctly for a...

متن کامل

Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)

Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial TakeGrant model...

متن کامل

Earthwork Volume Optimization Using Imperialistic Competitive Algorithm to Minimize Energy Consumption of Agricultural Land Leveling

Land leveling is one of the most important steps in soil preparation for consequent objectives.  Parallel policies need to take both energy and environmental subjects into the account as well as certain financial development and eco-friendly protection. Energy is one of the most important elements in agricultural sector. Nevertheless, pollution is linked with the usage of fossil fuels (particul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1208.1346  شماره 

صفحات  -

تاریخ انتشار 2012