151
Views
15
CrossRef citations to date
0
Altmetric
Original Articles

Fault-tree modelling of computer system security

&
Pages 805-819 | Received 27 Apr 2004, Published online: 25 Jan 2007

References

  • Brocklehurst , S. , Littlewood , B. , Olovsson , T. and Jonsson , E. 1994 . On measurement of operational security . IEEE Aerospace and Electronic Systems Magazine , 9 : 7 – 16 .
  • Brooke , P. J. and Paige , R. F. 2003 . Fault trees for security system design and analysis . Computers and Security , 22 : 256 – 264 .
  • Martin , J. 1973 . Security, Accuracy, and Privacy in Computer Systems , Englewood Cliffs, NJ : Prentice-Hall .
  • O’Gorman , L. 2003, Comparing passwords, tokens and biometrics for user authentication . Proceedings of the IEEE , 91 : 2021 – 2040 .
  • Tanaka , H. , Fan , L. T. , Lai , F. S. and Toguchi , D. 1983 . Fault-tree analysis by fuzzy probability . IEEE Transactions on Reliability , R-32 : 453 – 457 .
  • Weber , D. P. Fuzzy fault tree analysis . Proceedings of the 3rd IEEE Conference on Fuzzy Systems , Vol. 3 , pp. 1899 – 1904 . New York : IEEE Press) .
  • Rushdi , A. M. 1985 . Uncertainty analysis of fault-tree outputs . IEEE Transactions on Reliability , R-34 : 458 – 462 .
  • Rushdi , A. M. and Kafrawy , K. F. 1988 . Uncertainty propagation in fault-tree analysis using an exact method of moments . Microelectronics and Reliability , 28 : 945 – 965 .
  • Kafrawy , K. F. and Rushdi , A. M. 1990 . Uncertainty analysis of fault trees with statistically correlated failure data . Microelectronics and Reliability , 30 : 157 – 175 .
  • Rushdi , A. M. 1983 . How to hand-check a symbolic reliability expression . IEEE Transactions on Reliability , R-32 : 402 – 408 .
  • Trivedi , K. S. 2002 . Probability and Statistics with Reliability Queuing and Computer Science Applications , (2nd edn) , Englewood Cliffs, NJ : Prentice-Hall .
  • Gollman , D. 2000 . Computer Security , Chichester, , UK : Wiley .
  • Alayed , A. , Furnell , S. M. and Barlaw , I. M. 2002 . “ Addressing internet security vulnerabilities ” . In Security in the Information Society: Visions and Perspectives , Edited by: Ghonaimy , M. A. 121 – 132 . Boston, MA : Kluwer Academic .
  • Salah , D. , Aslan , H. K. and El-Hadidi , M. T. 2002 . “ A detection scheme for the SK virus ” . In Security in the Information Society: Visions and Perspectives , Edited by: Ghonaimy , M. A. 171 – 182 . Boston, MA : Kluwer Academic .
  • Stallings , W. 2003 . Network and Internetwork Security: Principles and Practice , (3rd edn) , Englewood Cliffs, NJ : Prentice-Hall .
  • Anderson , R. J. 2001 . Security Engineering , New York : Wiley .
  • Tanenbaum , A. S. 2001 . Modern Operating Systems , Englewood Cliffs, NJ : Prentice-Hall .
  • Kaufman , C. , Perlman , R. and Speciner , M. 2002 . Network Security , (2nd edn) , Englewood Cliffs, NJ : Prentice-Hall .
  • Ebeling , C. E. 1997 . An Introduction to Reliability and Maintainability Engineering , New York : McGraw-Hill .
  • Henley , E. J. and Kumamoto , H. 1981 . Reliability Engineering and Risk Assessment , Englewood Cliffs, NJ : Prentice-Hall .
  • Henley , E. J. and Kumamoto , H. 1992 . Probability Risk Assessment: Reliability Engineering Design and Analysis , New York : IEEE Press .
  • Kumamoto , H. 1993 . “ Fault tree analysis ” . In New Trends in System Reliability Evaluation, Fundamental Studies in Engineering , Edited by: Misra , K. B. Vol. 16 , 249 – 312 . Amsterdam : Elsevier .
  • Bennetts , R. G. 1975 . On the analysis of fault trees . IEEE Transactions on Reliability , R-24 : 194 – 203 .
  • Rushdi , A. M. and Abdul-Ghani , A. A. 1993 . A comparison between reliability analyses based primarily on disjointness or statistical independence . Microelectronics and Reliability , 33 : 965 – 978 .
  • Abraham , J. A. 1979 . An improved algorithm for network reliability . IEEE Transactions on Reliability , R-28 : 58 – 62 .
  • Dotson , W. P. and Gobian , J. O. 1979 . A new analysis technique for probability graphs . IEEE Transactions on Circuits and Systems , CAS-26 : 855 – 865 .
  • Rushdi , A. M. 1983 . Symbolic reliability analysis with the aid of the variable-entered Karnaugh maps . IEEE Transactions on Reliability , R-32 : 134 – 139 .
  • Veeraraghavan , M. and Trivedi , K. S. 1993 . “ Multiple variable inversion techniques ” . In New Trends in System Reliability Evaluation, Fundamental Studies in Engineering , Edited by: Misra , K. B. Vol. 16 , 39 – 74 . Amsterdam : Elsevier .
  • Crama , Y. and Hammer , P. 2004 . Boolean Functions Available online at: http://www.sig.egss.ulg.ac.be/rogp/Crama (accessed 20 March 2004)
  • Rushdi , A. M. and Goda , A. S. 1985 . Symbolic reliability analysis via Shannon’s expansion and statistical independence . Microelectronics and Reliability , 25 : 1041 – 1053 .
  • Page , L. B. and Perry , J. E. 1989 . Reliability of directed networks using the factoring theorem . IEEE Transactions on Reliability , R-38 : 556 – 562 .
  • Yin , L. , Smith , M. A.J. and Trivedi , K. S. 2001 . “ Uncertainty analysis in reliability modeling ” . In Proceedings of the 2001 Annual Reliability and Maintainability Symposium , 229 – 234 . New York : IEEE Press .
  • Rushdi , A. M. 1993 . “ Reliability of k-out-of-n, systems ” . In New Trends in System Reliability Evaluation, Fundamental Studies in Engineering , Edited by: Misra , K. B. Vol. 16 , 185 – 227 . Amsterdam : Elsevier .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.