U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Conference Paper

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs

Published: July 10, 2018

Author(s)

Chen Cao (Penn State University), Lunpin Yuan (Penn State University), Anoop Singhal (NIST), Peng Liu (Penn State University), Xiaoyan Sun (California State University), Sencun Zhu (Penn State University)

Conference

Name: IFIP Annual Conference on Data and Applications Security and Privacy
Dates: 07/01/2018
Location: Bergamo, Italy
Citation: DBSec 2018: Data and Applications Security and Privacy XXXII, vol. 10980, pp. 330-348

Abstract

Keywords

mission impact; active cyber defense; cloud computing; attack graphs
Control Families

None selected

Documentation

Publication:
https://doi.org/10.1007/978-3-319-95729-6_21

Supplemental Material:
Preprint (pdf)

Document History:
07/10/18: Conference Paper (Final)

Topics

Security and Privacy

modeling, threats

Technologies

cloud & virtualization