Author image not provided
 Pamela Peretti

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article12.67
Citation Count76
Publication count6
Publication years2006-2008
Available for download1
Average downloads per article203.00
Downloads (cumulative)203
Downloads (12 Months)7
Downloads (6 Weeks)1
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


6 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 6 of 6
Sort by:

1
February 2008 Electronic Notes in Theoretical Computer Science (ENTCS): Volume 197 Issue 2, February, 2008
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 4

Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures that are able to stop all the vulnerabilities. In order to represent preferences among possible countermeasures of a given attack, defence trees are enriched ...
Keywords: Answer Set Programming, CR-Prolog, Defence tree

2
September 2007 CP'07: Proceedings of the 13th international conference on Principles and practice of constraint programming
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Defence trees are used to represent attack and defence strategies in security scenarios; the aim in such scenarios is to select the best set of countermeasures have to be applied to stop all the vulnerabilities. To represent the preference among the possible countermeasures of a given attack, defence trees are ...

3 published by ACM
March 2007 SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 203

Full text available: PDFPDF
In this paper we present a qualitative approach for the selection of security countermeasures able to protect an IT system from attacks. For this purpose, we model security scenarios by using defense trees (an extension of attack trees) and preferences over countermeasure using Conditional Preference networks (CP-nets for short). In ...

4
February 2007 Electronic Notes in Theoretical Computer Science (ENTCS): Volume 168, February, 2007
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 1

Risk analysis has recently emerged as a structured and precise methodology to help modern companies understand their risks and plan the relative countermeasures well in advance. It is based on a number of indicators: parameters that quantify the key concepts on which an enterprise designs its security and safety investments. ...
Keywords: mitigated risk, time-critical, exposure factor, retaliation, collusion

5
August 2006 FAST'06: Proceedings of the 4th international conference on Formal aspects in security and trust
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 27

In this paper we use defense trees, an extension of attack trees with countermeasures, to represent attack scenarios and game theory to detect the most promising actions attacker and defender. On one side the attacker wants to break the system (with as little efforts as possible), on the opposite side ...
Keywords: risk analysis, security, game theory

6
April 2006 ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 34

In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scenarios by using defense trees, an extension of attack trees with attack countermeasures and we use economic quantitative indexes for computing the defender's return on ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us