Distributed Database System Security Model of Power Enterprise Based on Intrusion Tolerance Technology
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..
[2] Peng Liu. Engineering a distributed intrusion tolerant database system using COTS components , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[3] Q Lu. Digital Power System-The Power System Technological Trend in the New Century , 2000 .
[4] Hao Xu,et al. Efficient Damage Assessment and Repair in Resilient Distributed Database Systems , 2001, DBSec.
[5] Mohammad Zulkernine,et al. DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.
[6] Sushil Jajodia,et al. Application-level isolation to cope with malicious database users , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[7] Brajendra Panda,et al. Reconstructing the Database after Electronic Attacks , 1998, DBSec.
[8] Peng Liu. Architectures for intrusion tolerant database systems , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].