Identifying Critical Components During Information Security Evaluations

Rae, Andrew & Fidge, Colin J. (2005) Identifying Critical Components During Information Security Evaluations. Journal of Research and Practice in Information Technology, 37(4), pp. 391-402.



Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device’s design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device’s design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Impact and interest:

8 citations in Scopus
1 citations in Web of Science®
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

200 since deposited on 30 Mar 2006
1 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 3756
Item Type: Journal Article
Refereed: Yes
Additional URLs:
Keywords: information security, computer communications devices, security evaluations
ISSN: 1443-458X
Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Format not elsewhere classified (080499)
Divisions: Past > QUT Faculties & Divisions > Faculty of Science and Technology
Copyright Owner: Copyright 2005 Australian Computer Society
Copyright Statement: Reproduced in accordance with the copyright policy of the publisher.
Deposited On: 30 Mar 2006 00:00
Last Modified: 29 Feb 2012 13:11

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page