Information Security
暂无分享,去创建一个
[1] B. Dutertre,et al. Intrusion tolerant software architectures , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[2] Rangaswamy Jagannathan,et al. SYSTEM DESIGN DOCUMENT: NEXT-GENERATION INTRUSION DETECTION EXPERT SYSTEM (NIDES) , 1993 .
[3] Radek Vingralek,et al. How to build a trusted database system on untrusted storage , 2000, OSDI.
[4] Paul Helman,et al. Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..
[5] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[6] Eric Rescorla,et al. An introduction to OpenSSL programming, part II of II , 2001 .
[7] Kjeld Høyer Mortensen. Automatic Code Generation Method Based on Coloured Petri Net Models Applied on an Access Control System , 2000, ICATPN.
[8] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[9] BishopMatt,et al. The threat from the net , 1997 .
[10] Donald Sannella,et al. The Definition of Extended ML: A Gentle Introduction , 1997, Theor. Comput. Sci..
[11] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[12] John P. McDermott,et al. Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[13] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[14] George C. Necula,et al. Safe kernel extensions without run-time checking , 1996, OSDI '96.
[15] David Mosberger,et al. httperf—a tool for measuring web server performance , 1998, PERV.
[16] Peng Liu. Architectures for intrusion tolerant database systems , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[17] Frank Pfenning,et al. System Description: Twelf - A Meta-Logical Framework for Deductive Systems , 1999, CADE.
[18] Sushil Jajodia,et al. Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..
[19] Peng Liu,et al. ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications , 2001, DBSec.
[20] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[21] B. A. Hartman. A Gypsy-Based Kernel , 1984, 1984 IEEE Symposium on Security and Privacy.
[22] Deep Medhi,et al. Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[23] Sushil Jajodia,et al. Using Checksums to Detect Data Corruption , 2000, EDBT.
[24] David P. Reed,et al. Naming and synchronization in a decentralized computer system , 1978 .
[25] Matthew C. Elder,et al. Survivability architectures: issues and approaches , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.