\babel@toc {nil}{}\relax \contentsline {section}{\numberline {1}Introduction}{2}{}% \contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{}% \contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{}% \contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{3}{}% \contentsline {section}{\numberline {2}Related Works}{3}{}% \contentsline {section}{\numberline {3}Experimental Networks}{4}{}% \contentsline {section}{\numberline {4}Centralities and their Applications to Compliance Graphs}{5}{}% \contentsline {subsection}{\numberline {4.1}Introduction}{5}{}% \contentsline {subsection}{\numberline {4.2}Degree}{5}{}% \contentsline {subsection}{\numberline {4.3}Betweenness}{5}{}% \contentsline {subsection}{\numberline {4.4}Katz}{6}{}% \contentsline {subsection}{\numberline {4.5}K-Path Edge}{7}{}% \contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{7}{}% \contentsline {section}{\numberline {5}Transitive Closure}{8}{}% \contentsline {subsection}{\numberline {5.1}Introduction and Application}{8}{}% \contentsline {section}{\numberline {6}Dominant Tree}{9}{}% \contentsline {subsection}{\numberline {6.1}Introduction and Application}{9}{}% \contentsline {section}{\numberline {7}Results and Result Analysis}{10}{}% \contentsline {subsection}{\numberline {7.1}HIPAA Network}{10}{}% \contentsline {subsection}{\numberline {7.2}PCI DSS Network}{10}{}% \contentsline {section}{\numberline {8}Conclusions and Future Work}{10}{}% \contentsline {section}{Bibliography}{15}{}% \contentsline {section}{\numberline {A}HIPAA Results}{17}{}% \contentsline {section}{\numberline {B}PCI DSS Results}{21}{}%