Management of security policy configuration using a Semantic Threat Graph approach

Simon N. Foley, William M. Fitzgerald. Management of security policy configuration using a Semantic Threat Graph approach. Journal of Computer Security, 19(3):567-605, 2011. [doi]

@article{FoleyF11,
  title = {Management of security policy configuration using a Semantic Threat Graph approach},
  author = {Simon N. Foley and William M. Fitzgerald},
  year = {2011},
  doi = {10.3233/JCS-2011-0421},
  url = {http://dx.doi.org/10.3233/JCS-2011-0421},
  tags = {graph-rewriting, security, rewriting, systematic-approach},
  researchr = {https://researchr.org/publication/FoleyF11},
  cites = {0},
  citedby = {0},
  journal = {Journal of Computer Security},
  volume = {19},
  number = {3},
  pages = {567-605},
}