메뉴 건너뛰기




Volumn 3347, Issue , 2004, Pages 146-157

Vulnerabilities and threats in distributed systems

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; DISTRIBUTED COMPUTER SYSTEMS; FAULT TOLERANT COMPUTER SYSTEMS; NETWORK SECURITY; FAULT TOLERANCE;

EID: 35048894382     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30555-2_18     Document Type: Article
Times cited : (12)

References (29)
  • 1
    • 0024914229 scopus 로고
    • Security-Control Methods for Statistical Databases: A Comparative Study
    • Dec.
    • N.R. Adam and J.C. Wortmann, "Security-Control Methods for Statistical Databases: A Comparative Study," ACM Computing Surveys, Vol. 21, No. 4, Dec. 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4
    • Adam, N.R.1    Wortmann, J.C.2
  • 4
    • 0034501876 scopus 로고    scopus 로고
    • Windows of Vulnerability: A Case Study Analysis
    • Dec.
    • W.A. Arbaugh, et al., "Windows of Vulnerability: A Case Study Analysis," IEEE Computer, pp. 52-59, Vol. 33 (12), Dec. 2000.
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1
  • 9
    • 35048847849 scopus 로고    scopus 로고
    • Vulnerabilities and Fraud in Computing Systems
    • Sv. Stefan, Serbia and Montenegro, Oct.
    • B. Bhargava, "Vulnerabilities and Fraud in Computing Systems," Proc. Intl. Conf. IPSI, Sv. Stefan, Serbia and Montenegro, Oct. 2003.
    • (2003) Proc. Intl. Conf. IPSI
    • Bhargava, B.1
  • 10
    • 0242622301 scopus 로고    scopus 로고
    • Fault-tolerant authentication and group key management in mobile computing
    • Las Vegas, June
    • B. Bhargava, S. Kamisetty and S. Madria, "Fault-tolerant authentication and group key management in mobile computing," Intl. Conf. on Internet Camp., Las Vegas, June 2000.
    • (2000) Intl. Conf. on Internet Camp.
    • Bhargava, B.1    Kamisetty, S.2    Madria, S.3
  • 15
    • 0001924088 scopus 로고    scopus 로고
    • A Model for Secure Protocols and Their Compositions
    • N. Heintze and J.D. Tygar, "A Model for Secure Protocols and Their Compositions," IEEE Transactions on Software Engineering, Vol. 22, No. 1, 1996, pp. 16-30.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 16-30
    • Heintze, N.1    Tygar, J.D.2
  • 16
    • 0033489651 scopus 로고    scopus 로고
    • On the Functional Relation between Security and Dependability Impairments
    • Sep.
    • E. Jonsson et al., "On the Functional Relation Between Security and Dependability Impairments," Proc. 1999 Workshop on New Security Paradigms, Sep. 1999, pp. 104-111.
    • (1999) Proc. 1999 Workshop on New Security Paradigms , pp. 104-111
    • Jonsson, E.1
  • 18
    • 84974774507 scopus 로고
    • Towards Operational Measures of Computer Security
    • B. Littlewood at al., "Towards Operational Measures of Computer Security", Journal of Computer Security, Vol. 2, 1993, pp. 211-229.
    • (1993) Journal of Computer Security , vol.2 , pp. 211-229
    • Littlewood, B.1
  • 21
    • 84955619209 scopus 로고
    • Applying the Dependability Paradigm to Computer Security
    • Sep.
    • C. Meadows, "Applying the Dependability Paradigm to Computer Security," Proc. Workshop on New Security Paradigms, Sep. 1995, pp. 75-81.
    • (1995) Proc. Workshop on New Security Paradigms , pp. 75-81
    • Meadows, C.1
  • 25
    • 23544459288 scopus 로고
    • Formal Methods for the Analysis of Authentication Protocols
    • Dept. of Electrical Engineering and Computer Science, University of Michigan, Nov.
    • A.D. Rubin and P. Honeyman, "Formal Methods for the Analysis of Authentication Protocols," Tech. Rep. 93-7, Dept. of Electrical Engineering and Computer Science, University of Michigan, Nov. 1993.
    • (1993) Tech. Rep. 93-7
    • Rubin, A.D.1    Honeyman, P.2
  • 26
    • 35048822327 scopus 로고    scopus 로고
    • CERIAS Classic Vulnerability Database User Manual
    • CERIAS, Purdue University, West Lafayette, IN
    • G. Song et al., "CERIAS Classic Vulnerability Database User Manual," Technical Report 2000-17, CERIAS, Purdue University, West Lafayette, IN, 2000.
    • (2000) Technical Report 2000-17
    • Song, G.1
  • 29
    • 33746922743 scopus 로고    scopus 로고
    • Dynamic Trust Production Based on Interaction Sequence
    • Dept. Comp. Sciences, Purdue Univ., Mar.
    • Y. Zhong, Y. Lu, and B. Bhargava, "Dynamic Trust Production Based on Interaction Sequence," Tech. Rep. CSD-TR 03-006, Dept. Comp. Sciences, Purdue Univ., Mar.2003.
    • (2003) Tech. Rep. CSD-TR 03-006
    • Zhong, Y.1    Lu, Y.2    Bhargava, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.