{"title":"Inference-security analysis using resolution theorem-proving","authors":"N. Rowe","doi":"10.1109/ICDE.1989.47242","DOIUrl":null,"url":null,"abstract":"A nonnumeric analog of statistical methods for proving security is described and implemented. The approach involves analyzing facts and inference rules assumed to be known to a compromiser and deriving all their possible consequences using resolution theorem-proving, a technique which is argued to be far more appropriate to this problem than rule-based expert systems or information-flow analysis. An important contribution of this method is augmentation of resolution to handle associated time intervals and probabilities of statements being true. The augmentation is simple to use by domain experts untrained in computers, and it is believed to provide the first truly practical tool for analysis of indirect logical inferences in information systems. Its capabilities are demonstrated with an example from military security.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989] Proceedings. Fifth International Conference on Data Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDE.1989.47242","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
A nonnumeric analog of statistical methods for proving security is described and implemented. The approach involves analyzing facts and inference rules assumed to be known to a compromiser and deriving all their possible consequences using resolution theorem-proving, a technique which is argued to be far more appropriate to this problem than rule-based expert systems or information-flow analysis. An important contribution of this method is augmentation of resolution to handle associated time intervals and probabilities of statements being true. The augmentation is simple to use by domain experts untrained in computers, and it is believed to provide the first truly practical tool for analysis of indirect logical inferences in information systems. Its capabilities are demonstrated with an example from military security.<>