A Comparison of Intrusion-Tolerant System Architectures
暂无分享,去创建一个
[1] Alysson Neves Bessani,et al. The FOREVER service for fault/intrusion removal , 2008, WRAITS '08.
[2] Franklin Webber,et al. The DPASA Survivable JBI — A High-Water Mark in Intrusion-Tolerant Systems , 2007 .
[3] Magnus Almgren,et al. An Architecture for an Adaptive Intrusion-Tolerant Server , 2002, Security Protocols Workshop.
[4] Jaynarayan H. Lala,et al. Foundations of Intrusion Tolerant Systems , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[5] Tao Zhang,et al. Building intrusion-tolerant secure software , 2005, International Symposium on Code Generation and Optimization.
[6] Michael Gertz,et al. The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications , 2001 .
[7] Rafael R. Obelheiro,et al. Overlay Network Topology Reconfiguration in Byzantine Settings , 2007 .
[8] Miguel Correia,et al. Resilient Intrusion Tolerance through Proactive and Reactive Recovery , 2007 .
[9] William H. Sanders,et al. An architecture for adaptive intrusion‐tolerant applications , 2006, Softw. Pract. Exp..
[10] Paulo Veríssimo,et al. Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.
[11] Rick Smith,et al. Intrusion tolerance via network layer controls , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[12] Rüdiger Kapitza,et al. Hypervisor-Based Efficient Proactive Recovery , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).
[13] Arun K. Sood,et al. Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES) , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[14] Arun K. Sood,et al. Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture , 2009 .
[15] James C. Reynolds,et al. On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[16] Arun K. Sood,et al. Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.
[17] Mohamed Hamdi,et al. Intrusion-tolerant framework for heterogeneous Wireless Sensor Networks , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.
[18] Jong Sou Park,et al. A rejuvenation methodology of cluster recovery , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..