A Novel Intrusion Tolerant System Using Live Migration
暂无分享,去创建一个
Hyunsoo Yoon | Yongjoo Shin | Yunho Lee | Sihu Song | Yunho Lee | H. Yoon | Yongjoo Shin | S. Song
[1] Hyunsoo Yoon,et al. A novel Adaptive Cluster Transformation (ACT)-based intrusion tolerant architecture for hybrid information technology , 2013, The Journal of Supercomputing.
[2] Jun Huang,et al. Virtualization-based Recovery Approach for Intrusion Tolerance , 2013 .
[3] R. Sindoori,et al. An Overview of Disaster Recovery in Virtualization Technology , 2013 .
[4] Lin Li,et al. Applications of Intrusion-Tolerance Pre-response in the Grid Enterprises , 2012, 2012 Fourth International Conference on Computational and Information Sciences.
[5] Jian-Hua Huang,et al. The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model , 2011, WISM.
[6] Arun K. Sood,et al. A Comparison of Intrusion-Tolerant System Architectures , 2011, IEEE Security & Privacy.
[7] Arun K. Sood,et al. Combining intrusion detection and recovery for enhancing system dependability , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[8] Binoy Ravindran,et al. Lightweight Live Migration for High Availability Cluster Service , 2010, SSS.
[9] Miguel Correia,et al. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery , 2010, IEEE Transactions on Parallel and Distributed Systems.
[10] Arun K. Sood,et al. Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT) , 2009, 2009 Second International Conference on Dependability.
[11] Hai Jin,et al. Live migration of virtual machine based on full system trace and replay , 2009, HPDC '09.
[12] Vincent Nicomette,et al. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers , 2009, IEEE Transactions on Dependable and Secure Computing.
[13] Alysson Neves Bessani,et al. The FOREVER service for fault/intrusion removal , 2008, WRAITS '08.
[14] Tobias Distler,et al. Efficient state transfer for hypervisor-based proactive recovery , 2008, WRAITS '08.
[15] Arun K. Sood,et al. Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES) , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[16] Franklin Webber,et al. The DPASA Survivable JBI — A High-Water Mark in Intrusion-Tolerant Systems , 2007 .
[17] William H. Sanders,et al. An architecture for adaptive intrusion‐tolerant applications , 2006, Softw. Pract. Exp..
[18] Paulo Veríssimo,et al. Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.
[19] Arun K. Sood,et al. Incorruptible system self-cleansing for intrusion tolerance , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[20] Y. Huang. Self-Cleansing Systems for Intrusion Containment , 2006 .
[21] William H. Sanders,et al. Automatic model-driven recovery in distributed systems , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).
[22] Feiyi Wang,et al. SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[23] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[24] Magnus Almgren,et al. An Architecture for an Adaptive Intrusion-Tolerant Server , 2002, Security Protocols Workshop.
[25] Noah Treuhaft,et al. Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies , 2002 .
[26] Herb Schwetman,et al. CSIM19: a powerful tool for building system models , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).
[27] Yennun Huang,et al. Software Implemented Fault Tolerance Technologies and Experience , 1993, FTCS.