Skip to main content

Critical Critical Systems

  • Conference paper
Book cover Formal Aspects of Security (FASec 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2629))

Included in the following conference series:

Abstract

I discuss the view of communication networks as self-organised critical systems, the mathematical models that may be needed to describe the emergent properties of such networks, and how certain security hygiene schemes may push a network into a super-critical state, potentially leading to large scale security disasters

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Addis, M.J., Allen, P.J., Cheng, Y., Hall, M., Stairmand, M., Hall, W., DeRoure, D.: Spending less time in Internet traffic jams. In: PAAM 1999: Proceedings of the Fourth International Conference on the Practical application of Intelligent Agents and Multi-Agents (1999)

    Google Scholar 

  2. Bak, P.: How Nature Works: the science of self-organized criticality. Oxford University Press, Oxford (1997)

    Google Scholar 

  3. Barabas, A.-L.: Linked: the new science of networks. Perseus, Cambridge (2002)

    Google Scholar 

  4. Bonabeau, E.W., Dorigo, M., Theraulaz, G.: Swarm Intelligence: from natural to artificial systems. Oxford University Press, Oxford (1999)

    MATH  Google Scholar 

  5. Buchanan, M.: SUbiquity: the science of history. Weidenfeld & Nicholson (2000)

    Google Scholar 

  6. Cardelli, L., Gordon, A.D.: Ambient Logic (2002) (submitted)

    Google Scholar 

  7. Cohen, I.R.: Tending Adam’s Garden: evolving the cognitive immune self. Academic Press, London (2000)

    Google Scholar 

  8. Castillo-Chavez, C., Blower, S., van de Driessche, P., Kirschner, D. (eds.): Mathematical Approaches for Emerging and Re-emerging Infectious Diseases Part I: An Introduction to Models, Methods, and Theory. Springer, Heidelberg (2002)

    Google Scholar 

  9. Chivers, H.: Private communication (2002)

    Google Scholar 

  10. Dasgupta, D. (ed.): Artificial Immune Systems and Their Applications. Springer, Heidelberg (1999)

    MATH  Google Scholar 

  11. DeMarco, T.: Slack. Broadway (2001)

    Google Scholar 

  12. Drossel, B., McKane, A.J.: Modelling Food Webs. In: Handbook of Graphs and Networks. Wiley, Chichester (2002)

    Google Scholar 

  13. Fontana, W., Wagner, G., Buss, L.W.: Beyond digital naturalism. Artificial Life 1, 211–227 (1994)

    Article  Google Scholar 

  14. Franke, M.A.: Yellowstone in the Afterglow: lessons from the fires (2000)

    Google Scholar 

  15. Goodwin, B.: How the Leopard Changed Its Spots: the evolution of complexity. Phoenix (1994)

    Google Scholar 

  16. Haggstrom, O.: Finite Markov Chains and Algorithmic Applications. Cambridge University Press, Cambridge (2002)

    Book  Google Scholar 

  17. Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1985)

    MATH  Google Scholar 

  18. Jensen, F.V.: Bayesian Networks and Decision Graphs. Springer, Heidelberg (2001)

    MATH  Google Scholar 

  19. Jensen, H.J.: Self-Organized Criticality: emergent complex behaviour in physical and biological systems. Cambridge University Press, Cambridge (1998)

    Google Scholar 

  20. Kauffman, S.A.: The Origins of Order: self-organization and selection in evolution. Cambridge University Press, Cambridge (1993)

    Google Scholar 

  21. Kauffman, S.A.: TAt Home in the Universe: the search for laws of complexity. Viking, New York (1995)

    Google Scholar 

  22. Kephart, J.O., White, S.R.: Directed-Graph Epidemiological Models of Computer Viruses. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California (1991)

    Google Scholar 

  23. Matricardi, P.M., Rosmini, F., Riondino, S., et al.: Exposure to foodborne and orofecal microbes versus airborne viruses in relation to atopy and allergic rhinitis: epidemiological study. British Medical Journal 320, 412–417 (2000)

    Article  Google Scholar 

  24. Milner, R.: Communication and Concurrency. Prentice-Hall, Englewood Cliffs (1989)

    MATH  Google Scholar 

  25. Milner, R.: Communicating and Mobile Systems: the pi-calculus. Cambridge University Press, Cambridge (1999)

    MATH  Google Scholar 

  26. Milner, R.: Bigraphs as a Model for Mobile Interaction. In: Corradini, A., Ehrig, H., Kreowski, H.-J., Rozenberg, G. (eds.) ICGT 2002. LNCS, vol. 2505. Springer, Heidelberg (2002) Electronic edn.

    Chapter  Google Scholar 

  27. Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice-Hall, Englewood Cliffs (1997)

    Google Scholar 

  28. Segel, L.A., Cohen, I.R. (eds.): Design Principles for the Immune System and Other Distributed Autonomous Systems. Oxford University Press, Oxford (2001)

    Google Scholar 

  29. Sol, R., Goodwin, B.: Signs of Life: how complexity pervades biology. Basic Books, New York (2000)

    Google Scholar 

  30. Somayaji, A., Hofmeyr, S., Forrest, S.: Principles of a Computer Immune System. In: New Security Paradigms Workshop (1998)

    Google Scholar 

  31. Stauffer, D., Aharony, A.: Introduction to Percolation Theory, 2nd edn. Taylor and Francis, Abington (1994)

    Google Scholar 

  32. Watts, D.J.: Small Worlds: the dynamics of networks between order and randomness. Princeton University Press, Princeton (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stepney, S. (2003). Critical Critical Systems. In: Abdallah, A.E., Ryan, P., Schneider, S. (eds) Formal Aspects of Security. FASec 2002. Lecture Notes in Computer Science, vol 2629. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40981-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40981-6_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20693-4

  • Online ISBN: 978-3-540-40981-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics