메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 229-238

Availability enforcement by obligations and aspects identification

Author keywords

Aspects; Availability; Obligation; Temporized actions

Indexed keywords

MATHEMATICAL MODELS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33750959395     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2006.36     Document Type: Conference Paper
Times cited : (15)

References (14)
  • 3
    • 79959553529 scopus 로고
    • Considerations in the preparation of a set of availability criteria
    • Ottawa, Canada, May
    • E. Bacic and M. Kuchta. Considerations in the Preparation of a Set of Availability Criteria. In Third Annual Canadian Computer Security Symposium, Ottawa, Canada, May 1991.
    • (1991) Third Annual Canadian Computer Security Symposium
    • Bacic, E.1    Kuchta, M.2
  • 4
    • 84902507067 scopus 로고    scopus 로고
    • Formal reasoning of various categories of widely exploited security vulnerabilities by pointer taintedness semantics
    • Toulouse, France, August. Kluwer
    • S. Chen, K. Pattabiraman, Z. Kalbarczyk, and R. Iyer. Formal reasoning of various categories of widely exploited security vulnerabilities by pointer taintedness semantics. In 19th International Information Security Conference, Toulouse, France, August 2004. Kluwer.
    • (2004) 19th International Information Security Conference
    • Chen, S.1    Pattabiraman, K.2    Kalbarczyk, Z.3    Iyer, R.4
  • 9
    • 0000713886 scopus 로고    scopus 로고
    • Aspect-oriented programming
    • G. Kiczales. Aspect-oriented programming. ACM Comput. Surv., 28(4es), 1996.
    • (1996) ACM Comput. Surv. , vol.28 , Issue.4 ES
    • Kiczales, G.1
  • 10
    • 82955230066 scopus 로고    scopus 로고
    • An overview of AspectJ
    • 15th European Conf. on Object-Oriented Programming (ECOOP), Budapest, Hungary, June. Springer
    • G. Kiczales and E. Hilsdale et al. An Overview of AspectJ. In 15th European Conf. on Object-Oriented Programming (ECOOP), volume 2072 of Lecture Notes in Computer Science, Budapest, Hungary, June 2001. Springer.
    • (2001) Lecture Notes in Computer Science , vol.2072
    • Kiczales, G.1    Hilsdale, E.2
  • 11
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service networks
    • C. Meadows. A cost-based framework for analysis of denial of service networks. Journal of Computer Security, 9(1/2):143-164, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 12
    • 0026850008 scopus 로고
    • A ressource allocation model for denial of service
    • Oakland, CA
    • J. Millen. A ressource allocation model for denial of service. In IEEE Symposium on Security and Privacy, Oakland, CA, 1992.
    • (1992) IEEE Symposium on Security and Privacy
    • Millen, J.1
  • 13
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • J. Mirkovic and P. Reiher. A taxonomy of ddos attack and ddos defense mechanisms. SIGCOMM Comput. Commun. Rev., 34(2):39-53, 2004.
    • (2004) SIGCOMM Comput. Commun. Rev. , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 14
    • 0025441368 scopus 로고
    • A specification and verification method for preventing denial of service
    • June
    • C. Yu and V. Gligor. A specification and verification method for preventing denial of service. IEEE Transactions on Software Engineering, 16(6):581-592, June 1990
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.6 , pp. 581-592
    • Yu, C.1    Gligor, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.