Probabilistic Validation of Intrusion Tolerance 1
暂无分享,去创建一个
William H. Sanders | Ronald J. Watro | Michel Cukier | Ronald Watro | Partha Pal | Franklin Webber | P. Pal | W. Sanders | M. Cukier | F. Webber
[1] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[2] David Wright,et al. Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..
[3] J. Lowry. An initial foray into understanding adversary planning and courses of action , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[4] Jeannette M. Wing. Survivability analysis of networked systems , 2000, FORTE.
[5] H. Kopetz,et al. Dependability: Basic Concepts and Terminology , 1992, Dependable Computing and Fault-Tolerant Systems.
[6] Kishor S. Trivedi,et al. Characterizing intrusion tolerant systems using a state transition model , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[8] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[9] Somesh Jha,et al. Survivability analysis of networked systems , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[10] Tomas Olovsson,et al. A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..
[11] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..