-
1
-
-
3242798215
-
A Taxonomy of Compositional Adaptation
-
Technical Report MSU-CSE-04-17, Department of Computer Science and Engineering, Michigan State University, East Lansing, Michigan
-
P. McKinley, S. Sadjadi, E. Kasten, B. Cheng, "A Taxonomy of Compositional Adaptation." Technical Report MSU-CSE-04-17, Department of Computer Science and Engineering, Michigan State University, East Lansing, Michigan, 2004.
-
(2004)
-
-
McKinley, P.1
Sadjadi, S.2
Kasten, E.3
Cheng, B.4
-
2
-
-
34748910209
-
-
Technical Report MSU-CSE-03-35, Computer Science and Engineering, Michigan State University, East Lansing, Michigan, December
-
S. Sadjadi, "A Survey of Adaptive Middleware." Technical Report MSU-CSE-03-35, Computer Science and Engineering, Michigan State University, East Lansing, Michigan, December 2003.
-
(2003)
A Survey of Adaptive Middleware
-
-
Sadjadi, S.1
-
3
-
-
0033689082
-
Supporting reconfigurable security policies for mobile programs
-
pps
-
B. Hashii, S. Malabarba, R. Pandey, M. Bishop, "Supporting reconfigurable security policies for mobile programs." Computer Networks, vol 33(2000), pps. 77-93.
-
(2000)
Computer Networks
, vol.33
, pp. 77-93
-
-
Hashii, B.1
Malabarba, S.2
Pandey, R.3
Bishop, M.4
-
4
-
-
36249027998
-
Software Security using Software Dynamic Translation
-
Technical Report CS-2001-29, Department of Computer Science, University of Virginia
-
K. Scott, J. Davidson, Software Security using Software Dynamic Translation. Technical Report CS-2001-29, Department of Computer Science, University of Virginia, 2001.
-
(2001)
-
-
Scott, K.1
Davidson, J.2
-
6
-
-
84943385283
-
Retargetable and Reconfigurable Software Dynamic Translation
-
pps, March
-
K. Scott, N. Kumar, S. Velusamy, B. Childers, J. Davidson, M. Soffa, "Retargetable and Reconfigurable Software Dynamic Translation." In Code Generation and Optimization (CGO 2003), International Symposium, pps. 36-47, March 2003.
-
(2003)
Code Generation and Optimization (CGO 2003), International Symposium
, pp. 36-47
-
-
Scott, K.1
Kumar, N.2
Velusamy, S.3
Childers, B.4
Davidson, J.5
Soffa, M.6
-
7
-
-
33745944184
-
Secure and Practical Defense Against Code-injection Attacks using Software Dynamic Translation
-
pps
-
W. Hu, J. Hiser, D. Williams, A. Filipi, J. Davidson, D. Evans, J. Knight, A. Nguyen-Tuong, J. Rowanhill, "Secure and Practical Defense Against Code-injection Attacks using Software Dynamic Translation." In ACM/Usenix International Conference On Virtual Execution Environments, pps. 2-12, 2006.
-
(2006)
ACM/Usenix International Conference On Virtual Execution Environments
, pp. 2-12
-
-
Hu, W.1
Hiser, J.2
Williams, D.3
Filipi, A.4
Davidson, J.5
Evans, D.6
Knight, J.7
Nguyen-Tuong, A.8
Rowanhill, J.9
-
8
-
-
70350134326
-
The Willow Survivability Architecture
-
J. Knight, D. Heimbigner, A. Wolf, A. Carzaniga, J. Hill, P. Devanbu. "The Willow Survivability Architecture." In Fourth Information Survivability Workshop (ISW-2001).
-
In Fourth Information Survivability Workshop (ISW-2001)
-
-
Knight, J.1
Heimbigner, D.2
Wolf, A.3
Carzaniga, A.4
Hill, J.5
Devanbu, P.6
-
9
-
-
3142707659
-
The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications
-
Washington, DC, June
-
J. Knight, D. Heimbigner, A. Wolf, A. Carzaniga, J. Hill, P. Devanbu, M. Gertz, "The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications." Intrusion Tolerance Workshop, International Conference on Dependable Systems and Networks, Washington, DC, June 2002
-
(2002)
Intrusion Tolerance Workshop, International Conference on Dependable Systems and Networks
-
-
Knight, J.1
Heimbigner, D.2
Wolf, A.3
Carzaniga, A.4
Hill, J.5
Devanbu, P.6
Gertz, M.7
-
11
-
-
34547224272
-
Intrusion Management Using Configurable Architecture Models
-
CU-CS-929-02 University of Colorado
-
D. Heimbigner, A. Wolf, "Intrusion Management Using Configurable Architecture Models." Department of Computer Science Technical Report CU-CS-929-02 University of Colorado, 2002.
-
(2002)
Department of Computer Science Technical Report
-
-
Heimbigner, D.1
Wolf, A.2
-
12
-
-
30644473909
-
Adaptive Trust Negotiation and Access Control
-
pps
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, K. Seamons, "Adaptive Trust Negotiation and Access Control." ACM Symposium on Access Control Models and Technologies, pps. 139-146, 2005.
-
(2005)
ACM Symposium on Access Control Models and Technologies
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.5
-
15
-
-
0027810202
-
The process group approach to reliable distributed computing
-
Dec
-
K. Birman, "The process group approach to reliable distributed computing." Communications of ACM 36(12), Dec. 1993.
-
(1993)
Communications of ACM
, vol.36
, Issue.12
-
-
Birman, K.1
-
16
-
-
84962309834
-
Survivability Architectures: Issues and Approaches
-
IEEE Computer Society Press. Los Alamitos, CA, January
-
J. Knight, K. Sullivan, M. Elder, C. Wang, "Survivability Architectures: Issues and Approaches." In DARPA Information Survivability Conference and Exposition. IEEE Computer Society Press. Los Alamitos, CA, January 2000, pp. 157-171.
-
(2000)
DARPA Information Survivability Conference and Exposition
, pp. 157-171
-
-
Knight, J.1
Sullivan, K.2
Elder, M.3
Wang, C.4
-
17
-
-
36248982481
-
-
J. Lala, Foundations of Intrusion Tolerance Systems. IEEE Computer Society Press, Catalog # PR02057, 2003.
-
J. Lala, "Foundations of Intrusion Tolerance Systems." IEEE Computer Society Press, Catalog # PR02057, 2003.
-
-
-
-
18
-
-
3242810625
-
Composing Adaptive Software
-
July
-
P. McKinley, S. Sadjadi, E. Kasten, and B. Cheng, "Composing Adaptive Software," IEEE Computer, 37(7):56-64, July 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.7
, pp. 56-64
-
-
McKinley, P.1
Sadjadi, S.2
Kasten, E.3
Cheng, B.4
|