메뉴 건너뛰기




Volumn 52, Issue 2, 2003, Pages 181-194

Building survivable services using redundancy and adaptation

Author keywords

Adaptation; Dependability; Distributed systems; Intrusion tolerance; Redundancy; Survivability; Trustworthiness

Indexed keywords

ADAPTIVE ALGORITHMS; DISTRIBUTED COMPUTER SYSTEMS; INTERNET; NETWORK PROTOCOLS; REDUNDANCY; SECURITY SYSTEMS; SOFTWARE PROTOTYPING;

EID: 0037325751     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2003.1176985     Document Type: Article
Times cited : (25)

References (53)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • Jan.
    • M. Abadi and R. Needham, "Prudent Engineering Practice for Cryptographic Protocols," IEEE Trans. Software Eng., vol. 22, no. 1, pp. 6-15, Jan. 1996.
    • (1996) IEEE Trans. Software Eng. , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 3
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • R. Anderson and R. Needham, "Robustness Principles for Public Key Protocols," Proc. Crypto '95, pp. 236-247, 1995.
    • (1995) Proc. Crypto '95 , pp. 236-247
    • Anderson, R.1    Needham, R.2
  • 4
    • 0002459033 scopus 로고    scopus 로고
    • Survivability in the age of vulnerable systems
    • Nov.
    • M. Barbacci, "Survivability in the Age of Vulnerable Systems," Computer, vol. 29, no. 11, p. 8, Nov. 1996.
    • (1996) Computer , vol.29 , Issue.11 , pp. 8
    • Barbacci, M.1
  • 5
    • 0022563731 scopus 로고
    • Review of point-to-point network routing algorithms
    • P. Bell and K. Jabbour, "Review of Point-to-Point Network Routing Algorithms," IEEE Comm. Magazine, vol. 24, no. 1, pp. 34-38, 1986.
    • (1986) IEEE Comm. Magazine , vol.24 , Issue.1 , pp. 34-38
    • Bell, P.1    Jabbour, K.2
  • 6
    • 0032203011 scopus 로고    scopus 로고
    • Coyote: A system for constructing fine-grain configurable communication services
    • Nov.
    • N. Bhatti, M. Hiltunen, R. Schlichting, and W. Chiu, "Coyote: A System for Constructing Fine-Grain Configurable Communication Services," ACM Trans. Computer Systems, vol. 16, no. 4, pp. 321-366, Nov. 1998.
    • (1998) ACM Trans. Computer Systems , vol.16 , Issue.4 , pp. 321-366
    • Bhatti, N.1    Hiltunen, M.2    Schlichting, R.3    Chiu, W.4
  • 7
    • 0013451908 scopus 로고
    • Intrusion-tolerant security server for delta-4
    • Nov.
    • L. Blain and Y. Deswarte, "Intrusion-Tolerant Security Server for Delta-4," Proc. ESPRIT '90 Conf., pp. 355-370, Nov. 1990.
    • (1990) Proc. ESPRIT '90 Conf. , pp. 355-370
    • Blain, L.1    Deswarte, Y.2
  • 10
    • 84947422743 scopus 로고    scopus 로고
    • Affordable fault tolerance through adaptation
    • J. Rolin, ed., Springer, Apr.
    • I. Chang, M. Hiltunen, and R. Schlichting, "Affordable Fault Tolerance through Adaptation.," Parallel and Distributed Processing, J. Rolin, ed., pp. 585-603, Springer, Apr. 1998.
    • (1998) Parallel and Distributed Processing , pp. 585-603
    • Chang, I.1    Hiltunen, M.2    Schlichting, R.3
  • 13
    • 0025212376 scopus 로고
    • An adaptive algorithm to ensure differential service in a token-ring network
    • Jan.
    • M. Choi and C. Krishna, "An Adaptive Algorithm to Ensure Differential Service in a Token-Ring Network," IEEE Trans. Computers, vol. 39, no. 1, pp. 19-33, Jan. 1990.
    • (1990) IEEE Trans. Computers , vol.39 , Issue.1 , pp. 19-33
    • Choi, M.1    Krishna, C.2
  • 17
    • 0000239931 scopus 로고    scopus 로고
    • The block cipher rijndael
    • J.-J. Quisquater and B. Schneier, eds., Springer-Verlag
    • J. Daemen and V. Rijmen, "The Block Cipher Rijndael," Smart Card Research and Applications, J.-J. Quisquater and B. Schneier, eds., pp. 288-296, Springer-Verlag, 2000.
    • (2000) Smart Card Research and Applications , pp. 288-296
    • Daemen, J.1    Rijmen, V.2
  • 18
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb.
    • D. Denning, "An Intrusion-Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 21
  • 22
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
    • (1976) IEEE Trans. Information Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 23
    • 84864878161 scopus 로고
    • Designing secure and reliable applications using fragmentation-redundancy-scattering: An object-oriented approach
    • Oct.
    • J.-C. Fabre, Y. Deswarte, and B. Randell, "Designing Secure and Reliable Applications Using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach," Proc. First European Dependable Computing Conf., pp. 21-38, Oct. 1994.
    • (1994) Proc. First European Dependable Computing Conf. , pp. 21-38
    • Fabre, J.-C.1    Deswarte, Y.2    Randell, B.3
  • 28
    • 0004206089 scopus 로고    scopus 로고
    • Dept. of Computer Science, Univ. of Auckland
    • P. Gutmann, "Cryptlib," Dept. of Computer Science, Univ. of Auckland, 1998.
    • (1998) Cryptlib
    • Gutmann, P.1
  • 29
    • 0032182406 scopus 로고    scopus 로고
    • Configuration management for highly-customizable software
    • Oct.
    • M. Hiltunen, "Configuration Management for Highly-Customizable Software," IEE Proc.: Software, vol. 145, no. 5, pp. 180-188, Oct. 1998.
    • (1998) IEE Proc.: Software , vol.145 , Issue.5 , pp. 180-188
    • Hiltunen, M.1
  • 31
    • 0030232554 scopus 로고    scopus 로고
    • Adaptive distributed and fault-tolerant systems
    • Sept.
    • M. Hiltunen and R. Schlichting, "Adaptive Distributed and Fault-Tolerant Systems," Computer Systems Science and Eng., vol. 11, no. 5, pp. 125-133, Sept. 1996.
    • (1996) Computer Systems Science and Eng. , vol.11 , Issue.5 , pp. 125-133
    • Hiltunen, M.1    Schlichting, R.2
  • 32
    • 0000361091 scopus 로고    scopus 로고
    • A configurable membership service
    • May
    • M. Hiltunen and R. Schlichting, "A Configurable Membership Service," IEEE Trans. Computers, vol. 47, no. 5, pp. 573-586, May 1998.
    • (1998) IEEE Trans. Computers , vol.47 , Issue.5 , pp. 573-586
    • Hiltunen, M.1    Schlichting, R.2
  • 34
    • 0025722247 scopus 로고
    • The x-Kernel: An architecture for implementing network protocols
    • Jan.
    • N. Hutchinson and L. Peterson, "The x-Kernel: An Architecture for Implementing Network Protocols," IEEE Trans. Software Eng., vol. 17, no. 1, pp. 64-76, Jan. 1991.
    • (1991) IEEE Trans. Software Eng. , vol.17 , Issue.1 , pp. 64-76
    • Hutchinson, N.1    Peterson, L.2
  • 35
    • 85013623251 scopus 로고
    • Congestion avoidance and control
    • Aug.
    • V. Jacobson, "Congestion Avoidance and Control," Proc. SIGCOMM '88 Symp., pp. 314-332, Aug. 1988.
    • (1988) Proc. SIGCOMM '88 Symp. , pp. 314-332
    • Jacobson, V.1
  • 37
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Apr.
    • E. Jonsson and T. Olovsson, "A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior," IEEE Trans. Software Eng., vol. 23, no. 4, pp. 235-245, Apr. 1997.
    • (1997) IEEE Trans. Software Eng. , vol.23 , Issue.4 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 38
    • 0003068282 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • Nov.
    • S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol," RFC (Standards Track) 2401, Nov. 1998.
    • (1998) RFC (Standards Track) , vol.2401
    • Kent, S.1    Atkinson, R.2
  • 42
    • 0019587141 scopus 로고
    • On the security of multiple encryption
    • July
    • R. Merkle and M. Hellman, "On the Security of Multiple Encryption," Comm. ACM, vol. 24, no. 7, pp. 465-467, July 1981.
    • (1981) Comm. ACM , vol.24 , Issue.7 , pp. 465-467
    • Merkle, R.1    Hellman, M.2
  • 43
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Sept.
    • B. Neuman and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Comm. Magazine, vol. 32, no. 9, pp. 33-38, Sept. 1994.
    • (1994) IEEE Comm. Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Ts'o, T.2
  • 45
  • 48
    • 0003195066 scopus 로고
    • The MD5 Message-Digest Algorithm
    • Apr.
    • R. Rivest, "The MD5 Message-Digest Algorithm," RFC 1321, Apr. 1992.
    • (1992) RFC , vol.1321
    • Rivest, R.1
  • 51
    • 0003714340 scopus 로고    scopus 로고
    • Washington, D.C: Committee on Information Systems Trustworthiness, Nat'l Research Council, Nat'l Academy Press, Sept.
    • Trust in Cyberspace, F. Schneider, ed. Washington, D.C: Committee on Information Systems Trustworthiness, Nat'l Research Council, Nat'l Academy Press, Sept. 1998.
    • (1998) Trust in Cyberspace
    • Schneider, F.1
  • 52
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Winter
    • J. Steiner, C. Neuman, and J. Schiller, "Kerberos: An Authentication Service for Open Network Systems," USENIX Conf. Proc., pp. 191-202, Winter 1988.
    • (1988) USENIX Conf. Proc. , pp. 191-202
    • Steiner, J.1    Neuman, C.2    Schiller, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.