Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments
暂无分享,去创建一个
[1] Chris Joslin,et al. Collaborative virtual environments: from birth to standardization , 2004, IEEE Communications Magazine.
[2] Jeff Yan,et al. Security design in online games , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[3] Pieter H. Hartel,et al. Secure Audit Logging with Tamper-Resistant Hardware , 2003, SEC.
[4] Rory Stuart,et al. Design of Virtual Environments , 2001 .
[5] Brian Neil Levine,et al. Cheat-proof playout for centralized and distributed online games , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[6] S. Singhal,et al. Networked virtual environments: design and implementation , 1999 .
[7] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[8] Bruce Schneier,et al. Remote auditing of software outputs using a trusted coprocessor , 1997, Future Gener. Comput. Syst..
[9] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[10] Andrew Rosenbloom,et al. Introduction , 2003, CACM.
[11] Christian Schallhart,et al. Transaction Processing for Clustered Virtual Environments , 2003 .
[12] Mihir Bellare,et al. Forward Integrity For Secure Audit Logs , 1997 .
[13] Sandeep Kishan Singhal,et al. Effective remote modeling in large-scale distributed simulation and visualization environments , 1996 .