메뉴 건너뛰기




Volumn 56, Issue 1-4, 2004, Pages 53-72

Modeling and evaluating the security threats of transient errors in firewall software

Author keywords

Firewall software; SAN model; Security; Transient errors

Indexed keywords

COMPUTER HARDWARE; COMPUTER SIMULATION; COMPUTER SYSTEM FIREWALLS; CRYPTOGRAPHY; DATABASE SYSTEMS; ERROR DETECTION; RANDOM PROCESSES; SECURITY OF DATA;

EID: 1042288833     PISSN: 01665316     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.peva.2003.07.013     Document Type: Conference Paper
Times cited : (7)

References (28)
  • 2
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of eliminating errors in cryptographic computations
    • D. Boneh, R.A. DeMillo, et al., On the importance of eliminating errors in cryptographic computations, in: Advances in Cryptology: Eurocrypt'97, 1997, pp. 37-51.
    • (1997) Advances in Cryptology: Eurocrypt'97 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2
  • 3
    • 0031654007 scopus 로고    scopus 로고
    • An automated approach for identifying potential vulnerabilities in software
    • Oakland, CA, May
    • A. Ghosh, T. O'Connor, et al., An automated approach for identifying potential vulnerabilities in software, in: IEEE Symposium on Security and Privacy, Oakland, CA, May 1998.
    • (1998) IEEE Symposium on Security and Privacy
    • Ghosh, A.1    O'Connor, T.2
  • 4
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystem
    • Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystem. Commun. ACM. 21(2):1978;120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 7
    • 0004347791 scopus 로고    scopus 로고
    • Differential power analysis: Leaking secrets
    • P. Kochar, J. Jaffe, B. Jun, Differential power analysis: leaking secrets, in: Crypto'99.
    • Crypto'99
    • Kochar, P.1    Jaffe, J.2    Jun, B.3
  • 9
    • 0034590869 scopus 로고    scopus 로고
    • Assessment of the applicability of COTS microprocessors in high-confidence computing systems: A case study
    • June
    • Y. He, A. Avizienis, Assessment of the applicability of COTS microprocessors in high-confidence computing systems: a case study, in: Proceedings of the ICDSN 2000, June 2000.
    • (2000) Proceedings of the ICDSN 2000
    • He, Y.1    Avizienis, A.2
  • 11
    • 0030286383 scopus 로고    scopus 로고
    • A gate-level simulation environment for alpha-particle-induced transient faults
    • H. Cha, E. Rudnick, J. Patel, et al., A gate-level simulation environment for alpha-particle-induced transient faults, IEEE Trans. Comput. 45 (11) (1996) 1248-1256.
    • (1996) IEEE Trans. Comput. , vol.45 , Issue.11 , pp. 1248-1256
    • Cha, H.1    Rudnick, E.2    Patel, J.3
  • 14
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Ortalo R., Deswarte Y., Kaaniche M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans. Software Eng. 25(5):1999;633-650.
    • (1999) IEEE Trans. Software Eng. , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswarte, Y.2    Kaaniche, M.3
  • 15
    • 1042278622 scopus 로고    scopus 로고
    • Mobius: An extensible tool for performance and dependability modeling
    • TOOLS 2000, Schaumburg, IL, March
    • D. Daly, D.D. Deavours, et al., Mobius: an extensible tool for performance and dependability modeling, in: Proceedings of the 11th International Conference, TOOLS 2000, Schaumburg, IL, March 2000.
    • (2000) Proceedings of the 11th International Conference
    • Daly, D.1    Deavours, D.D.2
  • 16
    • 1042290204 scopus 로고    scopus 로고
    • December 30
    • http://www.securityfocus.com , December 30, 2001.
    • (2001)
  • 24
    • 0012561327 scopus 로고    scopus 로고
    • Coming challenges in microarchitecture and architecture
    • R. Ronen, A. Mendelson, K. Lai, et al., Coming challenges in microarchitecture and architecture, Proc. IEEE 89 (3) (2001) 325-340.
    • (2001) Proc. IEEE , vol.89 , Issue.3 , pp. 325-340
    • Ronen, R.1    Mendelson, A.2    Lai, K.3
  • 25
    • 0029732375 scopus 로고    scopus 로고
    • IBM experiments in soft fails in computer electronics (1978-1994)
    • Ziegler J.F., et al. IBM experiments in soft fails in computer electronics (1978-1994). IBM J. R&D. 40(1):1996;3-18.
    • (1996) IBM J. R&D , vol.40 , Issue.1 , pp. 3-18
    • Ziegler, J.F.1
  • 26
    • 1042290202 scopus 로고    scopus 로고
    • Berkshire Products Inc.
    • PCI PC Watchdog Board User's Manual, Berkshire Products Inc. http://www.berkprod.com/pci_pc_watchdog.htm .
    • PCI PC Watchdog Board User's Manual
  • 27
    • 1042301847 scopus 로고    scopus 로고
    • IPAudit
    • IPAudit. http://ipaudit.sourceforge.net/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.