Run-time security evaluation (RTSE) for distributed applications
暂无分享,去创建一个
[1] Mukesh Singhal,et al. Advanced Concepts In Operating Systems , 1994 .
[2] Catherine Meadows. The Need for a Failure Model for Security , 1995 .
[3] John Rushby,et al. Critical system properties: survey and taxonomy , 1994 .
[5] Bruce M. McMillin,et al. A General Method for Maximizing the Error-Detecting Ability of Distributed Algorithms , 1994, PARLE.
[6] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[7] Flaviu Cristian,et al. Systematic Detection of Exception Occurrences , 1981, Sci. Comput. Program..
[8] Flaviu Cristian. Robust Data Types , 1981, Program Specification.
[9] HANAN LUTFIYYA,et al. Ccsp -a Formal System for Distributed Program Debugging , .
[10] Colin O'Halloran. On requirements and security in a CCIS , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.
[11] Bowen Alpern,et al. Defining Liveness , 1984, Inf. Process. Lett..
[12] C. A. R. Hoare,et al. Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.
[13] Arthur J. Bernstein,et al. Efficient solutions to the replicated log and dictionary problems , 1984, PODC '84.
[14] Bruce M. McMillin,et al. A General Method for Maximizing the Error-Detecting Ability of Distributed Algorithms , 1994, IEEE Trans. Parallel Distributed Syst..
[15] John McLean,et al. A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.