The Crutial Way of Critical Infrastructure Protection
暂无分享,去创建一个
Miguel Correia | Alysson Neves Bessani | Paulo Veríssimo | Nuno Ferreira Neves | Paulo Sousa | P. Veríssimo | A. Bessani | N. Neves | M. Correia | Paulo Sousa
[1] K. Carlsen,et al. Operating under stress and strain [electrical power systems control under emergency conditions] , 1978, IEEE Spectrum.
[2] S. Bellovin. Distributed Firewalls , 1994 .
[3] HarrisTim,et al. Xen and the art of virtualization , 2003 .
[4] Paulo Veríssimo,et al. How resilient are distributed f fault/intrusion-tolerant systems? , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[5] Stephen T. Kent,et al. IP Authentication Header , 1995, RFC.
[6] Fred B. Schneider,et al. Implementing trustworthy services using replicated state machines , 2005, IEEE Security & Privacy Magazine.
[7] Paulo Veríssimo,et al. Travelling through wormholes: a new look at distributed systems models , 2006, SIGA.
[8] T. Grance,et al. Guide to Supervisory Control and Data Acquisition (SCADA) and Other Industrial Control System Security , 2006 .
[9] David Geer. Security of critical control systems sparks concern , 2006, Computer.
[10] Paulo Veríssimo,et al. Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.
[11] Anas Abou El Kalam,et al. Access Control for Collaborative Systems: A Web Services Based Approach , 2007, IEEE International Conference on Web Services (ICWS 2007).
[12] Miguel Correia,et al. Resilient Intrusion Tolerance through Proactive and Reactive Recovery , 2007 .
[13] Rafael R. Obelheiro,et al. Overlay Network Topology Reconfiguration in Byzantine Settings , 2007 .
[14] Miguel Correia,et al. The CRUTIAL reference critical information infrastructure architecture: a blueprint , 2008, Int. J. Syst. Syst. Eng..