A survey on the usability and practical applications of Graphical Security Models
Autor: | Chun-Jen Chung, Dong Seong Kim, Dijiang Huang, Jin B. Hong |
---|---|
Rok vydání: | 2017 |
Předmět: |
021110 strategic
defence & security studies Security analysis General Computer Science Computational complexity theory business.industry Computer science Distributed computing 0211 other engineering and technologies 020206 networking & telecommunications Cloud computing Usability 02 engineering and technology Computer security model Network topology Theoretical Computer Science 0202 electrical engineering electronic engineering information engineering Human-computer interaction in information security business Representation (mathematics) Software engineering |
Zdroj: | Computer Science Review. 26:1-16 |
ISSN: | 1574-0137 |
DOI: | 10.1016/j.cosrev.2017.09.001 |
Popis: | This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usability, efficiency, and functionality of GrSMs (e.g., by using various model types and evaluation techniques), the networked system is evolving with many hosts and frequently changing topologies (e.g., Cloud, SDN, IoT etc.). To investigate the usability of GrSMs, this survey summarizes the characteristics of past research studies in terms of their development and computational complexity analysis, and specify their applications in terms of security metrics, availability of tools and their applicable domains. We also discuss the practical issues of modeling security, differences of GrSMs and their usability for future networks that are large and dynamic. |
Databáze: | OpenAIRE |
Externí odkaz: |