Security and dependability: then and now

We survey security research from the point of view of the dependability taxonomy developed by IFIP Working Group 10.4 and discuss changes since a similar survey was performed four years ago.

[1]  Timothy Fraser,et al.  Hardening COTS software with generic software wrappers , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[2]  Catherine A. Meadows,et al.  Security of Ramp Schemes , 1985, CRYPTO.

[3]  Lora Kassab,et al.  Towards Fault-Tolerant Mobile Agents , 1998 .

[4]  Guy L. Steele,et al.  The Java Language Specification , 1996 .

[5]  Jonathan K. Millen Local reconfiguration policies , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[6]  Michael K. Reiter,et al.  Toward acceptable metrics of authentication , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Rodolphe Ortalo,et al.  Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..

[9]  J. Froscher,et al.  Practical Defenses Against Storage Jamming , 1997 .

[10]  Jeffrey M. Voas,et al.  Agent Trustworthiness , 1998, ECOOP Workshops.

[11]  Andrew P. Moore,et al.  Design and Assurance Strategy for the NRL Pump , 1998, Computer.

[12]  Carleen Maitland,et al.  Trust in cyberspace , 2000 .

[13]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[14]  John P. McDermott,et al.  Doc, Wyatt, and Virgil: prototyping storage jamming defenses , 1997, Proceedings 13th Annual Computer Security Applications Conference.

[15]  Sushil Jajodia,et al.  Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[16]  Catherine A. Meadows,et al.  Applying the dependability paradigm to computer security , 1995, Proceedings of 1995 New Security Paradigms Workshop.