Abstract
Communication processes have to be observed because of the possibility that different kinds of threats occur in the processes of exchanging information in a network. Those threats are connected with: decryption possibility, losing jurisdiction, believing and freshness of information, message interception by intruders, etc. We monitor the communication protocol during its operation. Standard security attributes (as proposed by Barrows, Abadi, Needham and others) have been introduced to analyze the chosen aspects of security. We also employed a standard set of rules which interrelate parts of communication operations with security aspects. Our previous research introduced a system that investigates security related issues. It could be employed for auditing purposes and/or to predict failures given different kinds of communication threats. In this paper the security analysis is continued in the direction of building the model of dynamic modification of chosen factors (adequate to security aspect) with prognosis possibility.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Robert Harper., Logics and Languages for Security, pp. 15–819 (2007)
Focardi, R., Gorrieri, R.: A Classification of Security Properties. Journal of Computer Security 3, 5–33 (1995)
Beauquier, D.: On Probabilistic Timed Automata. Theoretical Computer Science 292, 65–84 (2003)
Gray III, J.W.: Toward a Mathematical Foundation for Information Flow Security. Journal of Computer Security 1, 255–294 (1992)
Evans, N., Schneider, S.: Analysing Time Dependent Security Properties in CSP Using PVS. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 222–237. Springer, Heidelberg (2000)
Kwiatkowska, M., Norman, G., Segala, R., Sproston, J.: Automatic Verification of Real-time Systems with Discrete Probability Distribution. Theoretical Computer Science 282, 101–150 (2002)
Kwiatkowska, M., Norman, R., Sproston, J.: Symbolic Model Checking of Probabilistic Timed Automata Using Backwards Reachability. Tech. rep. CSR-03-10, University of Birmingham (2003)
Alur, R., Dill, D.L.: A Theory of Timed Automata. Theoretical Computer Science 126, 183–235 (1994)
Szpyrka, M.: Fast and flexible modeling of real-time systems with RTCP- nets. Computer Science, 81–94 (2004)
Tadeusiewicz, R.: Introduction to Inteligent Systems. In: Wilamowski, B.M., Irvin, J.D. (eds.) Chapter No 1 in Book. The Industrial Electronic Handbook. CRC Press, Boca Raton (2011)
Tadeusiewicz, R.: Place and role of Intelligence Systems in Computer Science. Computer Methodsin Material Science 10(4), 193–206 (2010)
Alur, R., Courcoubetis, C., Dill, D.L.: Verifying Automata Specifications of Probabilistic Real- Time Systems. In: Huizing, C., de Bakker, J.W., Rozenberg, G., de Roever, W.-P. (eds.) REX 1991. LNCS, vol. 600, pp. 28–44. Springer, Heidelberg (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Piech, H., Grodzki, G. (2013). The System Conception of Investigation of the Communication Security Level in Networks. In: Abramowicz, W. (eds) Business Information Systems Workshops. BIS 2013. Lecture Notes in Business Information Processing, vol 160. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41687-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-41687-3_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41686-6
Online ISBN: 978-3-642-41687-3
eBook Packages: Computer ScienceComputer Science (R0)