GEMOM - Significant and Measurable Progress beyond the State of the Art
暂无分享,去创建一个
[1] Joel Weise. Security Architecture and Adaptive Security By , 2008 .
[2] R. M. Venkatesan,et al. Threat-adaptive security policy , 1997, 1997 IEEE International Performance, Computing and Communications Conference.
[3] Jared D. DeMott. The Evolving Art of Fuzzing , 2006 .
[4] Jon Whittle,et al. A Survey of Approaches to Adaptive Application Security , 2007, International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '07).
[5] Habtamu Abie,et al. A Conceptual Formal Framework for Developing and Maintaining Security-Critical Systems , 2005 .
[6] Graham Morgan,et al. A Message Oriented Middleware Solution Enabling Non-repudiation Evidence Generation for Reliable Web Services , 2007, ISAS.
[7] Jörgen Hansson,et al. An adaptable security manager for real-time transactions , 2000, Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000.
[8] Seyed Masoud Sadjadi,et al. A Survey of Adaptive Middleware , 2003 .
[9] Jun Zou,et al. Architecture and fuzzy adaptive security algorithm in intelligent firewall , 2002, MILCOM 2002. Proceedings.
[10] Betty H. C. Cheng,et al. A Taxonomy of Compositional Adaptation , 2004 .
[11] P. Lamanna,et al. ADAPTIVE SECURITY POLICIES ENFORCED BY SOFTWARE DYNAMIC TRANSLATION , 2002 .
[12] A. Shnitko. Adaptive security in complex information systems , 2003, 7th Korea-Russia International Symposium on Science and Technology, Proceedings KORUS 2003. (IEEE Cat. No.03EX737).
[13] Seyed Masoud Sadjadi,et al. Composing adaptive software , 2004, Computer.
[14] K. Schwan,et al. Dynamic authentication for high-performance networked applications , 1998, 1998 Sixth International Workshop on Quality of Service (IWQoS'98) (Cat. No.98EX136).
[15] Creighton Tsuan-Ren Hager,et al. Context Aware and Adaptive Security for Wireless Networks , 2004 .
[16] Li Zhou,et al. Adaptive trust negotiation and access control , 2005, SACMAT '05.
[17] Guofei Jiang,et al. Semantic message oriented middleware for publish/subscribe networks , 2004, SPIE Defense + Commercial Sensing.
[18] Declan O'Sullivan,et al. Towards a Managed Extensible Control Plane for Knowledge-Based Networking , 2006, DSOM.
[19] Habtamu Abie,et al. Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems , 2004, ICICS.