메뉴 건너뛰기




Volumn , Issue , 2003, Pages 110-114

An intrusion tolerant architecture for dynamic content internet servers

Author keywords

Adaptive redundancy; Fault tolerance; Intrusion tolerance

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMPUTER ARCHITECTURE; FAULT TOLERANT COMPUTER SYSTEMS; SERVERS; TELECOMMUNICATION SERVICES;

EID: 2642529568     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1036921.1036934     Document Type: Conference Paper
Times cited : (4)

References (16)
  • 1
    • 31344455537 scopus 로고    scopus 로고
    • An adaptive intrusion-tolerant server architecture
    • Cambridge (UK), April, to appear in Springer LNCS Series
    • A. Valdes et al., "An Adaptive Intrusion-Tolerant Server Architecture", in Proc. 10th International Workshop on Security Protocols, Cambridge (UK), April 2002, to appear in Springer LNCS Series.
    • (2002) Proc. 10th International Workshop on Security Protocols
    • Valdes, A.1
  • 2
    • 0003765598 scopus 로고
    • Office for Official Publications of the European Communities, ISBN 92-826-3004-8, June
    • Information Technology Security Evaluation Criteria (ITSEC), Office for Official Publications of the European Communities, ISBN 92-826-3004-8, June 1991.
    • (1991) Information Technology Security Evaluation Criteria (ITSEC)
  • 4
    • 0026155432 scopus 로고
    • Intrusion tolerance in distributed computing systems
    • Oakland, CA (USA), May
    • Y. Deswarte et al., "Intrusion tolerance in distributed computing systems", in Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA (USA), May 1991, pp. 110-121.
    • (1991) Proc. of the IEEE Symposium on Security and Privacy , pp. 110-121
    • Deswarte, Y.1
  • 6
    • 25544480800 scopus 로고    scopus 로고
    • The design of an adaptive intrusion tolerant database system
    • Sup. of the Proc. of the 2002 International Conference on Dependable Systems and Networks, June
    • P. Luenam and P. Liu, "The Design of an Adaptive Intrusion Tolerant Database System", IEEE Workshop on Intrusion Tolerant Systems, Sup. of the Proc. of the 2002 International Conference on Dependable Systems and Networks, June 2002, pp. C.2.1-C.2.8.
    • (2002) IEEE Workshop on Intrusion Tolerant Systems
    • Luenam, P.1    Liu, P.2
  • 9
    • 81055157683 scopus 로고    scopus 로고
    • Diversity against accidental and deliberate faults
    • IEEE Computer Society, Eds. P.Ammann, B.H.Barnes, S.Jajodia, E.H.Sibley, ISBN 0-7695-0337-3
    • Y. Deswarte et al., "Diversity against Accidental and Deliberate Faults", Computer Security, Dependability, & Assurance: From Needs to Solutions, IEEE Computer Society, Eds. P.Ammann, B.H.Barnes, S.Jajodia, E.H.Sibley, ISBN 0-7695-0337-3, 1999, pp. 171-181.
    • (1999) Computer Security, Dependability, & Assurance: From Needs to Solutions , pp. 171-181
    • Deswarte, Y.1
  • 13
    • 18944373357 scopus 로고    scopus 로고
    • Combining monitors for run-time system verification
    • Elsevier Science, December
    • J. Levy et al., "Combining monitors for run-time system verification". Electronic Notes in Theoretical Computer Science, 70(4), Elsevier Science, December 2002.
    • (2002) Electronic Notes in Theoretical Computer Science , vol.70 , Issue.4
    • Levy, J.1
  • 14
    • 2342591623 scopus 로고    scopus 로고
    • Software security for open source systems
    • January/February
    • C. Cowen, "Software security for open source systems", IEEE Security and Privacy, January/February 2003, pp. 38-45.
    • (2003) IEEE Security and Privacy , pp. 38-45
    • Cowen, C.1
  • 15
    • 2642538498 scopus 로고    scopus 로고
    • Advisory CA-2003-04
    • CERT, Advisory CA-2003-04, http://www.cert.org/advisories/CA-2003-04.html
  • 16
    • 84942244236 scopus 로고    scopus 로고
    • A tamper-resistant framework for unambiguous detection of attacks in user space using process monitors
    • Darmstadt, Germany, March
    • R. Chinchani et al., "A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors", IEEE Workshop on Information Assurance, Darmstadt, Germany, March 2003
    • (2003) IEEE Workshop on Information Assurance
    • Chinchani, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.