-
1
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
Jan.
-
M. Abadi and R. Needham, "Prudent Engineering Practice for Cryptographic Protocols," IEEE Trans. Software Eng., vol. 22, no. 1, pp. 6-15, Jan. 1996.
-
(1996)
IEEE Trans. Software Eng.
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
2
-
-
33244489573
-
Security amplification by composition: The case of double-iterated, ideal ciphers
-
H. Krawczyk, ed.
-
W. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan, "Security Amplification by Composition: The Case of Double-Iterated, Ideal Ciphers," Proc. Advances in Cryptology: Crypto '98, H. Krawczyk, ed., 1998.
-
(1998)
Proc. Advances in Cryptology: Crypto '98
-
-
Aiello, W.1
Bellare, M.2
Di Crescenzo, G.3
Venkatesan, R.4
-
3
-
-
84957714601
-
Robustness principles for public key protocols
-
R. Anderson and R. Needham, "Robustness Principles for Public Key Protocols," Proc. Crypto '95, pp. 236-247, 1995.
-
(1995)
Proc. Crypto '95
, pp. 236-247
-
-
Anderson, R.1
Needham, R.2
-
4
-
-
0002459033
-
Survivability in the age of vulnerable systems
-
Nov.
-
M. Barbacci, "Survivability in the Age of Vulnerable Systems," Computer, vol. 29, no. 11, p. 8, Nov. 1996.
-
(1996)
Computer
, vol.29
, Issue.11
, pp. 8
-
-
Barbacci, M.1
-
5
-
-
0022563731
-
Review of point-to-point network routing algorithms
-
P. Bell and K. Jabbour, "Review of Point-to-Point Network Routing Algorithms," IEEE Comm. Magazine, vol. 24, no. 1, pp. 34-38, 1986.
-
(1986)
IEEE Comm. Magazine
, vol.24
, Issue.1
, pp. 34-38
-
-
Bell, P.1
Jabbour, K.2
-
6
-
-
0032203011
-
Coyote: A system for constructing fine-grain configurable communication services
-
Nov.
-
N. Bhatti, M. Hiltunen, R. Schlichting, and W. Chiu, "Coyote: A System for Constructing Fine-Grain Configurable Communication Services," ACM Trans. Computer Systems, vol. 16, no. 4, pp. 321-366, Nov. 1998.
-
(1998)
ACM Trans. Computer Systems
, vol.16
, Issue.4
, pp. 321-366
-
-
Bhatti, N.1
Hiltunen, M.2
Schlichting, R.3
Chiu, W.4
-
7
-
-
0013451908
-
Intrusion-tolerant security server for delta-4
-
Nov.
-
L. Blain and Y. Deswarte, "Intrusion-Tolerant Security Server for Delta-4," Proc. ESPRIT '90 Conf., pp. 355-370, Nov. 1990.
-
(1990)
Proc. ESPRIT '90 Conf.
, pp. 355-370
-
-
Blain, L.1
Deswarte, Y.2
-
8
-
-
0013365091
-
Electronic quarantine: An automated intruder response tool
-
Oct.
-
P. Brutch, T. Brutch, and U. Pooch, "Electronic Quarantine: An Automated Intruder Response Tool," Proc. Information Survivability Workshop 1998, pp. 23-27, Oct. 1998.
-
(1998)
Proc. Information Survivability Workshop 1998
, pp. 23-27
-
-
Brutch, P.1
Brutch, T.2
Pooch, U.3
-
9
-
-
84962952893
-
DES Is not a group
-
E. Brickell, ed., Aug.
-
K. Campbell and M. Wiener, "DES Is Not a Group," Advances in Cryptology - CRYPTO '92, E. Brickell, ed., pp. 512-520, Aug. 1992.
-
(1992)
Advances in Cryptology - CRYPTO '92
, pp. 512-520
-
-
Campbell, K.1
Wiener, M.2
-
10
-
-
84947422743
-
Affordable fault tolerance through adaptation
-
J. Rolin, ed., Springer, Apr.
-
I. Chang, M. Hiltunen, and R. Schlichting, "Affordable Fault Tolerance through Adaptation.," Parallel and Distributed Processing, J. Rolin, ed., pp. 585-603, Springer, Apr. 1998.
-
(1998)
Parallel and Distributed Processing
, pp. 585-603
-
-
Chang, I.1
Hiltunen, M.2
Schlichting, R.3
-
11
-
-
0035020003
-
Constructing adaptive software in distributed systems
-
Apr.
-
W.-K. Chen, M. Hiltunen, and R. Schlichting, "Constructing Adaptive Software in Distributed Systems," Proc. 21st Int'l Conf. Distributed Computing Systems, pp. 635-643, Apr. 2001.
-
(2001)
Proc. 21st Int'l Conf. Distributed Computing Systems
, pp. 635-643
-
-
Chen, W.-K.1
Hiltunen, M.2
Schlichting, R.3
-
13
-
-
0025212376
-
An adaptive algorithm to ensure differential service in a token-ring network
-
Jan.
-
M. Choi and C. Krishna, "An Adaptive Algorithm to Ensure Differential Service in a Token-Ring Network," IEEE Trans. Computers, vol. 39, no. 1, pp. 19-33, Jan. 1990.
-
(1990)
IEEE Trans. Computers
, vol.39
, Issue.1
, pp. 19-33
-
-
Choi, M.1
Krishna, C.2
-
15
-
-
0022246697
-
Atomic broadcast: From simple message diffusion to byzantine agreement
-
June
-
F. Cristian, H. Aghili, R. Strong, and D. Dolev, "Atomic Broadcast: From Simple Message Diffusion to Byzantine Agreement," Proc. 15th Symp. Fault-Tolerant Computing, pp. 200-206, June 1985.
-
(1985)
Proc. 15th Symp. Fault-Tolerant Computing
, pp. 200-206
-
-
Cristian, F.1
Aghili, H.2
Strong, R.3
Dolev, D.4
-
16
-
-
0002873169
-
Intrusion tolerance approaches in ITUA
-
July
-
M. Cukier, J. Lyons, P. Pandey, H. Ramasamy, W. Sanders, P. Pal, F. Webber, R. Schantz, J. Loyall, R. Watro, M. Atighetchi, and J. Gossett, "Intrusion Tolerance Approaches in ITUA," FastAbstract in Supplement of the 2001 Int'l Conf. Dependable Systems and Networks, pp. 64-65, July 2001.
-
(2001)
FastAbstract in Supplement of the 2001 Int'l Conf. Dependable Systems and Networks
, pp. 64-65
-
-
Cukier, M.1
Lyons, J.2
Pandey, P.3
Ramasamy, H.4
Sanders, W.5
Pal, P.6
Webber, F.7
Schantz, R.8
Loyall, J.9
Watro, R.10
Atighetchi, M.11
Gossett, J.12
-
17
-
-
0000239931
-
The block cipher rijndael
-
J.-J. Quisquater and B. Schneier, eds., Springer-Verlag
-
J. Daemen and V. Rijmen, "The Block Cipher Rijndael," Smart Card Research and Applications, J.-J. Quisquater and B. Schneier, eds., pp. 288-296, Springer-Verlag, 2000.
-
(2000)
Smart Card Research and Applications
, pp. 288-296
-
-
Daemen, J.1
Rijmen, V.2
-
18
-
-
0023294428
-
An intrusion-detection model
-
Feb.
-
D. Denning, "An Intrusion-Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
19
-
-
85023809951
-
Threshold cryptosystems
-
G. Brassard, ed.
-
Y. Desmedt and Y. Frankel, "Threshold Cryptosystems," Proc. Advances in Cryptology Crypto '89, G. Brassard, ed., pp. 307-315, 1990.
-
(1990)
Proc. Advances in Cryptology Crypto '89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
20
-
-
0024134751
-
Saturne: A distributed computing system which tolerates faults and intrusions
-
Sept.
-
Y. Deswarte, J.-C. Fabre, J.-M. Fray, D. Powell, and P.-G. Ranea, "Saturne: A Distributed Computing System which Tolerates Faults and Intrusions," Proc. Workshop Future Trends of Distributed Computing Systems, pp. 329-338, Sept. 1990.
-
(1990)
Proc. Workshop Future Trends of Distributed Computing Systems
, pp. 329-338
-
-
Deswarte, Y.1
Fabre, J.-C.2
Fray, J.-M.3
Powell, D.4
Ranea, P.-G.5
-
22
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
23
-
-
84864878161
-
Designing secure and reliable applications using fragmentation-redundancy-scattering: An object-oriented approach
-
Oct.
-
J.-C. Fabre, Y. Deswarte, and B. Randell, "Designing Secure and Reliable Applications Using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach," Proc. First European Dependable Computing Conf., pp. 21-38, Oct. 1994.
-
(1994)
Proc. First European Dependable Computing Conf.
, pp. 21-38
-
-
Fabre, J.-C.1
Deswarte, Y.2
Randell, B.3
-
24
-
-
0001728612
-
Adapting to network and client variation via on-demand, dynamic distillation
-
Oct.
-
A. Fox, S. Gribble, E. Brewer, and E. Amir, "Adapting to Network and Client Variation via On-Demand, Dynamic Distillation," Proc. Seventh Architectural Support for Programming Languages and Operating Systems (ASPLOS) Conf., Oct. 1996.
-
(1996)
Proc. Seventh Architectural Support for Programming Languages and Operating Systems (ASPLOS) Conf.
-
-
Fox, A.1
Gribble, S.2
Brewer, E.3
Amir, E.4
-
26
-
-
0022564904
-
Intrusion-tolerance using fine-grain fragmentation-scattering
-
Apr.
-
J. Fray, Y. Deswarte, and D. Powell, "Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering," Proc. 1998 IEEE Symp. Security and Privacy, pp. 194-201, Apr. 1986.
-
(1986)
Proc. 1998 IEEE Symp. Security and Privacy
, pp. 194-201
-
-
Fray, J.1
Deswarte, Y.2
Powell, D.3
-
27
-
-
0013362514
-
Adaptive fault tolerance
-
Oct.
-
J. Goldberg, I. Greenberg, and T. Lawrence, "Adaptive Fault Tolerance," Proc. IEEE Workshop Advances in Parallel and Distributed Systems, pp. 127-132, Oct, 1993.
-
(1993)
Proc. IEEE Workshop Advances in Parallel and Distributed Systems
, pp. 127-132
-
-
Goldberg, J.1
Greenberg, I.2
Lawrence, T.3
-
28
-
-
0004206089
-
-
Dept. of Computer Science, Univ. of Auckland
-
P. Gutmann, "Cryptlib," Dept. of Computer Science, Univ. of Auckland, 1998.
-
(1998)
Cryptlib
-
-
Gutmann, P.1
-
29
-
-
0032182406
-
Configuration management for highly-customizable software
-
Oct.
-
M. Hiltunen, "Configuration Management for Highly-Customizable Software," IEE Proc.: Software, vol. 145, no. 5, pp. 180-188, Oct. 1998.
-
(1998)
IEE Proc.: Software
, vol.145
, Issue.5
, pp. 180-188
-
-
Hiltunen, M.1
-
31
-
-
0030232554
-
Adaptive distributed and fault-tolerant systems
-
Sept.
-
M. Hiltunen and R. Schlichting, "Adaptive Distributed and Fault-Tolerant Systems," Computer Systems Science and Eng., vol. 11, no. 5, pp. 125-133, Sept. 1996.
-
(1996)
Computer Systems Science and Eng.
, vol.11
, Issue.5
, pp. 125-133
-
-
Hiltunen, M.1
Schlichting, R.2
-
32
-
-
0000361091
-
A configurable membership service
-
May
-
M. Hiltunen and R. Schlichting, "A Configurable Membership Service," IEEE Trans. Computers, vol. 47, no. 5, pp. 573-586, May 1998.
-
(1998)
IEEE Trans. Computers
, vol.47
, Issue.5
, pp. 573-586
-
-
Hiltunen, M.1
Schlichting, R.2
-
33
-
-
0032675504
-
Real-time dependable channels: Customizing QoS attributes for distributed systems
-
June
-
M. Hiltunen, R. Schlichting, X. Han, M. Cardozo, and R. Das, "Real-Time Dependable Channels: Customizing QoS Attributes for Distributed Systems," IEEE Trans. Parallel and Distributed Systems, vol. 10, no. 6, pp. 600-612, June 1999.
-
(1999)
IEEE Trans. Parallel and Distributed Systems
, vol.10
, Issue.6
, pp. 600-612
-
-
Hiltunen, M.1
Schlichting, R.2
Han, X.3
Cardozo, M.4
Das, R.5
-
34
-
-
0025722247
-
The x-Kernel: An architecture for implementing network protocols
-
Jan.
-
N. Hutchinson and L. Peterson, "The x-Kernel: An Architecture for Implementing Network Protocols," IEEE Trans. Software Eng., vol. 17, no. 1, pp. 64-76, Jan. 1991.
-
(1991)
IEEE Trans. Software Eng.
, vol.17
, Issue.1
, pp. 64-76
-
-
Hutchinson, N.1
Peterson, L.2
-
35
-
-
85013623251
-
Congestion avoidance and control
-
Aug.
-
V. Jacobson, "Congestion Avoidance and Control," Proc. SIGCOMM '88 Symp., pp. 314-332, Aug. 1988.
-
(1988)
Proc. SIGCOMM '88 Symp.
, pp. 314-332
-
-
Jacobson, V.1
-
37
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Apr.
-
E. Jonsson and T. Olovsson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior," IEEE Trans. Software Eng., vol. 23, no. 4, pp. 235-245, Apr. 1997.
-
(1997)
IEEE Trans. Software Eng.
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
38
-
-
0003068282
-
Security architecture for the internet protocol
-
Nov.
-
S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol," RFC (Standards Track) 2401, Nov. 1998.
-
(1998)
RFC (Standards Track)
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
41
-
-
85084161955
-
Antigone: A flexible framework for secure group communication
-
Aug.
-
P. McDaniel, A. Prakash, and P. Honeyman, "Antigone: A Flexible Framework for Secure Group Communication," Proc. Eighth USENIX Security Symp., pp. 99-114, Aug. 1999.
-
(1999)
Proc. Eighth USENIX Security Symp.
, pp. 99-114
-
-
McDaniel, P.1
Prakash, A.2
Honeyman, P.3
-
42
-
-
0019587141
-
On the security of multiple encryption
-
July
-
R. Merkle and M. Hellman, "On the Security of Multiple Encryption," Comm. ACM, vol. 24, no. 7, pp. 465-467, July 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.7
, pp. 465-467
-
-
Merkle, R.1
Hellman, M.2
-
43
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Sept.
-
B. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm. Magazine, vol. 32, no. 9, pp. 33-38, Sept. 1994.
-
(1994)
IEEE Comm. Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Ts'o, T.2
-
46
-
-
0003336080
-
Paving the road to network security or the value of small cobble-stones
-
Feb.
-
H. Orman, S. O'Malley, R. Schroeppel, and D. Schwartz, "Paving the Road to Network Security or the Value of Small Cobble-stones," Proc. 1994 Internet Soc. Symp. Network and Distributed System Security, Feb. 1994.
-
(1994)
Proc. 1994 Internet Soc. Symp. Network and Distributed System Security
-
-
Orman, H.1
O'Malley, S.2
Schroeppel, R.3
Schwartz, D.4
-
47
-
-
0032114960
-
Building adaptive systems using ensemble
-
July
-
R. v Renesse, K. Birman, M. Hayden, A. Vaysburd, and D. Karr, "Building Adaptive Systems Using Ensemble," Software Practice and Experience, vol. 28, no. 9, pp. 963-979, July 1998.
-
(1998)
Software Practice and Experience
, vol.28
, Issue.9
, pp. 963-979
-
-
Renesse, R.V.1
Birman, K.2
Hayden, M.3
Vaysburd, A.4
Karr, D.5
-
48
-
-
0003195066
-
The MD5 Message-Digest Algorithm
-
Apr.
-
R. Rivest, "The MD5 Message-Digest Algorithm," RFC 1321, Apr. 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.1
-
49
-
-
0003774035
-
-
Technical Report TR98-1703, Dept. of Computer Science, Cornell Univ., Dec.
-
O. Rodeh, K. Birman, M. Hayden, Z. Xiao, and D. Dolev, "The Architecture and Performance of Security Protocols in the Ensemble Group Communication System," Technical Report TR98-1703, Dept. of Computer Science, Cornell Univ., Dec. 1998.
-
(1998)
The Architecture and Performance of Security Protocols in the Ensemble Group Communication System
-
-
Rodeh, O.1
Birman, K.2
Hayden, M.3
Xiao, Z.4
Dolev, D.5
-
50
-
-
4243931532
-
Probabilistic validation of intrusion tolerance
-
June
-
W. Sanders, M. Cukier, F. Webber, P. Pal, and R. Watro, "Probabilistic Validation of Intrusion Tolerance," FastAbstract in Supplement of the 2002 Int'l Conf. Dependable Systems and Networks, pp. B 78-79, June 2002.
-
(2002)
FastAbstract in Supplement of the 2002 Int'l Conf. Dependable Systems and Networks
-
-
Sanders, W.1
Cukier, M.2
Webber, F.3
Pal, P.4
Watro, R.5
-
51
-
-
0003714340
-
-
Washington, D.C: Committee on Information Systems Trustworthiness, Nat'l Research Council, Nat'l Academy Press, Sept.
-
Trust in Cyberspace, F. Schneider, ed. Washington, D.C: Committee on Information Systems Trustworthiness, Nat'l Research Council, Nat'l Academy Press, Sept. 1998.
-
(1998)
Trust in Cyberspace
-
-
Schneider, F.1
-
52
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Winter
-
J. Steiner, C. Neuman, and J. Schiller, "Kerberos: An Authentication Service for Open Network Systems," USENIX Conf. Proc., pp. 191-202, Winter 1988.
-
(1988)
USENIX Conf. Proc.
, pp. 191-202
-
-
Steiner, J.1
Neuman, C.2
Schiller, J.3
|