This HTML5 document contains 51 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n20http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n22http://purl.org/net/nknouf/ns/bibtex#
n15http://localhost/temp/predkladatel/
n17http://linked.opendata.cz/resource/domain/vavai/projekt/
n7http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n11http://linked.opendata.cz/ontology/domain/vavai/
n14https://schema.org/
n12http://linked.opendata.cz/resource/domain/vavai/zamer/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n18http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n16http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216305%3A26230%2F10%3APU89515%21RIV12-GA0-26230___/
n5http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216305%3A26230%2F10%3APU89515%21RIV12-GA0-26230___
rdf:type
n11:Vysledek skos:Concept
dcterms:description
This paper deals with an approach to security analysis of TCP/IP-based computer networks. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation should consist of a set of tools that can provide automatic analysis of router configurations, network topologies, and states with respect to checked properties. While this project aims at supporting a real practice, it stems from the previous, more theoretical research designing the method in detail including its formal background. This paper deals with an approach to security analysis of TCP/IP-based computer networks. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation should consist of a set of tools that can provide automatic analysis of router configurations, network topologies, and states with respect to checked properties. While this project aims at supporting a real practice, it stems from the previous, more theoretical research designing the method in detail including its formal background.
dcterms:title
An Approach for Automated Network-Wide Security Analysis An Approach for Automated Network-Wide Security Analysis
skos:prefLabel
An Approach for Automated Network-Wide Security Analysis An Approach for Automated Network-Wide Security Analysis
skos:notation
RIV/00216305:26230/10:PU89515!RIV12-GA0-26230___
n3:aktivita
n9:S n9:P n9:Z
n3:aktivity
P(FR-TI1/037), P(GA102/08/1429), S, Z(MSM0021630528)
n3:dodaniDat
n5:2012
n3:domaciTvurceVysledku
n7:3214044 n7:1842919 n7:5652294 n7:3876659
n3:druhVysledku
n21:D
n3:duvernostUdaju
n13:S
n3:entitaPredkladatele
n16:predkladatel
n3:idSjednocenehoVysledku
246169
n3:idVysledku
RIV/00216305:26230/10:PU89515
n3:jazykVysledku
n18:eng
n3:klicovaSlova
TCP/IP networks, changing network topology, network security analysis, bounded model-checking, SAT-based decision procedure
n3:klicoveSlovo
n4:bounded%20model-checking n4:network%20security%20analysis n4:TCP%2FIP%20networks n4:SAT-based%20decision%20procedure n4:changing%20network%20topology
n3:kontrolniKodProRIV
[460DE74B3091]
n3:mistoKonaniAkce
Menuires
n3:mistoVydani
Les Menuires
n3:nazevZdroje
Proceedings of the Ninth International Conference on Networks ICN 2010
n3:obor
n19:IN
n3:pocetDomacichTvurcuVysledku
4
n3:pocetTvurcuVysledku
4
n3:projekt
n17:GA102%2F08%2F1429 n17:FR-TI1%2F037
n3:rokUplatneniVysledku
n5:2010
n3:tvurceVysledku
Švéda, Miroslav Ryšavý, Ondřej Ráb, Jaroslav Matoušek, Petr
n3:typAkce
n20:WRD
n3:zahajeniAkce
2010-04-11+02:00
n3:zamer
n12:MSM0021630528
s:numberOfPages
6
n22:hasPublisher
IEEE Computer Society
n14:isbn
978-0-7695-3979-9
n15:organizacniJednotka
26230