{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:49Z","timestamp":1742913649712,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540309345"},{"type":"electronic","value":"9783540320999"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11602897_22","type":"book-chapter","created":{"date-parts":[[2005,11,17]],"date-time":"2005-11-17T10:31:17Z","timestamp":1132223477000},"page":"256-268","source":"Crossref","is-referenced-by-count":7,"title":["Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)"],"prefix":"10.1007","author":[{"given":"Hamid Reza","family":"Shahriari","sequence":"first","affiliation":[]},{"given":"Reza","family":"Sadoddin","sequence":"additional","affiliation":[]},{"given":"Rasool","family":"Jalili","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Zakeri","sequence":"additional","affiliation":[]},{"given":"Ali Reza","family":"Omidian","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Zerkle, D., Levitt, K.: NetKuang \u2013 A Muti-Host Configuration Vulnerability Checker. In: Proceedings of the sixth USENIX UNIX Security Symposium, San Jose, CA (1996)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/3-540-58618-0_72","volume-title":"Computer Security - ESORICS 94","author":"M. Dacier","year":"1994","unstructured":"Dacier, M., Deswarte, Y.: Privilege Graph: An Extension to the Typed Access Matrix Model. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875, pp. 319\u2013334. Springer, Heidelberg (1994)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Ritchey, R.W., Ammann, P.: Using Model Checking to Analyze Network Vulnerabilities. In: Proceedings of IEEE Symposium on Security and Privacy, May 2001, pp. 156\u2013165 (2001)","DOI":"10.1109\/SECPRI.2000.848453"},{"issue":"1\/2","key":"22_CR4","doi-asserted-by":"crossref","first-page":"189","DOI":"10.3233\/JCS-2002-101-209","volume":"10","author":"C.R. Ramakrishnan","year":"2002","unstructured":"Ramakrishnan, C.R., Sekar, R.: Model-Based Analysis of Configuration Vulnerabilities. Journal of Computer Security\u00a010(1\/2), 189\u2013209 (2002)","journal-title":"Journal of Computer Security"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Shahriari, H.R., Jalili, R.: Using CSP to Model and Analyze Transmission Control Vulnerabilities within the Broadcast Network. In: Proceedings of the IEEE International Networking and Communication Conference (INCC 2004), June 2004, pp. 42\u201347 (2004)","DOI":"10.1109\/INCC.2004.1366574"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable Graph-Based Network Vulnerability Analysis. In: Proceedings of 9th ACM Conference on Computer and Communications Security, Washington, DC (November 2002)","DOI":"10.1145\/586110.586140"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Noel, S., O\u2019Berry, B., Hutchinson, C., Jajodia, S., Keuthan, L., Nguyen, A.: Combinatorial Analysis of Network Security. In: Proceedings of the 16th Annual International Symposium on Aerospace\/Defence Sensing, Simulation, and Controls, Orlando, Florida (April 2002)","DOI":"10.1117\/12.458763"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Lipton, J.R., Snyder, L.: A Linear Time Algorithm for Deciding Security. In: Proc 17th Annual Symp. on the Foundations of Computer Science, October 1976, pp. 33\u201341 (1976)","DOI":"10.1109\/SFCS.1976.1"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Bishop, M.: Hierarchical Take-Grant Protection Systems. In: Proc. 8th Symp. on Operating Systems Principals, December 1981, pp. 107\u2013123 (1981)","DOI":"10.1145\/800216.806598"},{"key":"22_CR10","first-page":"237","volume-title":"Foundations of Secure Computing","author":"A. Jones","year":"1978","unstructured":"Jones, A.: Protection Mechanism Models: Their Usefulness. In: Foundations of Secure Computing, pp. 237\u2013254. Academic Press, New York City (1978)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Snyder, L.: On the Synthesis and Analysis of Protection Systems. In: Proc. Sixth Symp. on Operating Systems Principals, November 1977, pp. 141\u2013150 (1977)","DOI":"10.1145\/1067625.806557"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Wu, M.: Hierarchical Protection Systems. In: Proc. 1981 Symp. on Security and Privacy, April 1981, pp. 113\u2013123 (1981)","DOI":"10.1109\/SP.1981.10017"},{"issue":"4","key":"22_CR13","doi-asserted-by":"crossref","first-page":"331","DOI":"10.3233\/JCS-1996-4404","volume":"4","author":"M. Bishop","year":"1996","unstructured":"Bishop, M.: Conspiracy and Information Flow in the Take-Grant Protection Model. Journal of Computer Security\u00a04(4), 331\u2013360 (1996)","journal-title":"Journal of Computer Security"},{"key":"22_CR14","unstructured":"Frank, J., Bishop, M.: Extending The Take-Grant Protection System. Technical Report, Department of Computer Science, University of California at Davis (1996)"},{"key":"22_CR15","unstructured":"Derasion, R.: The Nessus Attack Scripting Language Reference Guide (2000), Available from http:\/\/www.nessus.org"},{"key":"22_CR16","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated Generation and Analysis of Attack Graphs. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA (2002)"},{"key":"22_CR17","unstructured":"Swiler, L., Phillips, C., Ellis, D., Chakerian, S.: Computer Attack Graph Generation Tool. In: Proceedings of DARPA Information Survivability Conference & Exposition II (June 2001)"},{"key":"22_CR18","volume-title":"Modeling and Analysis of Security Protocols - A CSP Approach","author":"P. Ryan","year":"2001","unstructured":"Ryan, P., Schneider, S.: Modeling and Analysis of Security Protocols - A CSP Approach. Addison-Wesley, Reading (2001)"},{"key":"22_CR19","unstructured":"Rohrmair, G., Lowe, G.: Using Data-Independence in the Analysis of Intrusion Detection Systems. In: Workshop on Issues in the Theory of Security (WITS 2003), Warsaw, Poland (April 2003)"},{"key":"22_CR20","volume-title":"Managing Cyber Threats: Issues, Approaches and Challenges","author":"S. Jajodia","year":"2003","unstructured":"Jajodia, S., Noel, S., O\u2019Berry, B.: Topological Analysis of Network Attack Vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats: Issues, Approaches and Challenges. Kluwer Academic Publisher, Dordrecht (2003)"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Managing Attack Graph Complexity through Visual Hierarchical Aggregation. In: Proceedings of the ACM CCS Workshop on Visualization and Data Mining for Computer Security, Fairfax, Virginia (October 2004)","DOI":"10.1145\/1029208.1029225"},{"key":"22_CR22","unstructured":"Shapiro, J.S.: The Practical Application of a Decidable Access Control Model. Technical Report SRL-2003-04, John Hopkins University (2003)"},{"key":"22_CR23","unstructured":"SANS Research Center: The SANS Top 20 Internet Security Vulnerabilities. Available from, http:\/\/www.sans.org\/top20\/"},{"issue":"3","key":"22_CR24","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1145\/322017.322025","volume":"24","author":"J.R. Lipton","year":"1977","unstructured":"Lipton, J.R., Snyder, L.: A Linear Time Algorithm for Deciding Subject Security. J. ACM\u00a024(3), 455\u2013464 (1977)","journal-title":"J. ACM"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11602897_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T18:03:19Z","timestamp":1736100199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11602897_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540309345","9783540320999"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11602897_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}