Algorithm for searching bridges of specified types in the protection graph for Take-Grant protection model
نویسنده
چکیده
The article contains the algorithm for searching a certain kind of bridges in the protection graph of Take-Grant model. The proposed algorithm is based on a classical breadth-first search algorithm.
منابع مشابه
Theft and Conspiracy in the Take-Grant Protection Model
Models of protection in computer systems usually possess two components: a finite, labeled, directed two color graph representing the protection state of an operating system and a finite set of graph transformation rules with which the protection state may be changed. Harrison et al. demonstrated [ 1 ] that the safety problem for a very general protection model is undecidable; i.e., no algorith...
متن کاملOPTIMALIZATION PHASE USING GRAPH MODELLING FOR RELIABLE BUILDING COMPLEXES
During the planning phase of modern, complex, block-structured, large-area located, but still landscape-harmonized health-care buildings, the key is the optimal positioning of the blocks and functions, simultaneously ensuring the most-effective backup-paths for any transportation route failure in the buildings in order to speed up system operation, reduce maintenance costs and especially to imp...
متن کاملPower Differential based Wide Area Protection
Current differential based wide area protection (WAP) has recently been proposed as a technique to increase the reliability of protection systems. It increases system stability and can prevent large contingencies such as cascading outages and blackouts. This paper describes how power differential protection (PDP) can be used within a WAP and shows that the algorithm operates correctly for a...
متن کاملNetwork Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial TakeGrant model...
متن کاملEarthwork Volume Optimization Using Imperialistic Competitive Algorithm to Minimize Energy Consumption of Agricultural Land Leveling
Land leveling is one of the most important steps in soil preparation for consequent objectives. Parallel policies need to take both energy and environmental subjects into the account as well as certain financial development and eco-friendly protection. Energy is one of the most important elements in agricultural sector. Nevertheless, pollution is linked with the usage of fossil fuels (particul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1208.1346 شماره
صفحات -
تاریخ انتشار 2012