Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A formal methodology for detecting managerial vulnerabilities and threats in an enterprise information system
Sengupta A., Mazumdar C., Bagchi A. Journal of Network and Systems Management19 (3):319-342,2011.Type:Article
Date Reviewed: Sep 21 2011

Sengupta et al. present a formal approach to detecting what they call “managerial” vulnerabilities. The term refers to vulnerabilities in the top level of the hierarchical layers of a system architecture (that is, application vulnerabilities).

The proposed model may have some theoretical value, but it has no practical value. The authors make no attempt to relate their abstract model to the components of a real system. Their definition of objects is ad hoc; it does not correspond to object-oriented models or to any other type of application object. The authors’ model is decidable in linear time in the case of a single object or a single application requirement, but these are not realistic assumptions.

This paper is difficult to follow and provides no examples to illustrate the concepts. It could provide bounds for real systems; however, the paper does not consider this. Of possible interest to security theoreticians, little is offered to working professionals and practice-oriented researchers.

Reviewer:  E. B. Fernandez Review #: CR139458 (1202-0215)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
General (H.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy