메뉴 건너뛰기




Volumn , Issue , 2007, Pages

A survey of approaches to adaptive application security

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE APPLICATION SECURITY; ADAPTIVE SOFTWARE SECURITY; APPLICATION-LEVEL SECURITY MECHANISMS; RUNTIME;

EID: 36248977519     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SEAMS.2007.2     Document Type: Conference Paper
Times cited : (37)

References (18)
  • 1
    • 3242798215 scopus 로고    scopus 로고
    • A Taxonomy of Compositional Adaptation
    • Technical Report MSU-CSE-04-17, Department of Computer Science and Engineering, Michigan State University, East Lansing, Michigan
    • P. McKinley, S. Sadjadi, E. Kasten, B. Cheng, "A Taxonomy of Compositional Adaptation." Technical Report MSU-CSE-04-17, Department of Computer Science and Engineering, Michigan State University, East Lansing, Michigan, 2004.
    • (2004)
    • McKinley, P.1    Sadjadi, S.2    Kasten, E.3    Cheng, B.4
  • 2
    • 34748910209 scopus 로고    scopus 로고
    • Technical Report MSU-CSE-03-35, Computer Science and Engineering, Michigan State University, East Lansing, Michigan, December
    • S. Sadjadi, "A Survey of Adaptive Middleware." Technical Report MSU-CSE-03-35, Computer Science and Engineering, Michigan State University, East Lansing, Michigan, December 2003.
    • (2003) A Survey of Adaptive Middleware
    • Sadjadi, S.1
  • 3
    • 0033689082 scopus 로고    scopus 로고
    • Supporting reconfigurable security policies for mobile programs
    • pps
    • B. Hashii, S. Malabarba, R. Pandey, M. Bishop, "Supporting reconfigurable security policies for mobile programs." Computer Networks, vol 33(2000), pps. 77-93.
    • (2000) Computer Networks , vol.33 , pp. 77-93
    • Hashii, B.1    Malabarba, S.2    Pandey, R.3    Bishop, M.4
  • 4
    • 36249027998 scopus 로고    scopus 로고
    • Software Security using Software Dynamic Translation
    • Technical Report CS-2001-29, Department of Computer Science, University of Virginia
    • K. Scott, J. Davidson, Software Security using Software Dynamic Translation. Technical Report CS-2001-29, Department of Computer Science, University of Virginia, 2001.
    • (2001)
    • Scott, K.1    Davidson, J.2
  • 11
    • 34547224272 scopus 로고    scopus 로고
    • Intrusion Management Using Configurable Architecture Models
    • CU-CS-929-02 University of Colorado
    • D. Heimbigner, A. Wolf, "Intrusion Management Using Configurable Architecture Models." Department of Computer Science Technical Report CU-CS-929-02 University of Colorado, 2002.
    • (2002) Department of Computer Science Technical Report
    • Heimbigner, D.1    Wolf, A.2
  • 15
    • 0027810202 scopus 로고
    • The process group approach to reliable distributed computing
    • Dec
    • K. Birman, "The process group approach to reliable distributed computing." Communications of ACM 36(12), Dec. 1993.
    • (1993) Communications of ACM , vol.36 , Issue.12
    • Birman, K.1
  • 17
    • 36248982481 scopus 로고    scopus 로고
    • J. Lala, Foundations of Intrusion Tolerance Systems. IEEE Computer Society Press, Catalog # PR02057, 2003.
    • J. Lala, "Foundations of Intrusion Tolerance Systems." IEEE Computer Society Press, Catalog # PR02057, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.