Abstract
The academic literature concerning fault tree analysis relates almost entirely to the design and development of safety-critical systems. This paper illustrates how similar techniques can be applied to the design and analysis of security-critical systems. The application of this technique is illustrated in an example inspired by a current public-key cryptosystem.
Original language | Undefined/Unknown |
---|---|
Pages (from-to) | 256-264 |
Number of pages | 9 |
Journal | Computers & Security |
Volume | 22 |
Issue number | 3 |
DOIs | |
Publication status | Published - 2003 |