-
1
-
-
51849140309
-
-
Bessani, A.N., Sousa, P., Correia, M., Neves, N.F., Verissimo, P.: Intrusion-tolerant protection for critical infrastructures. DI/FCUL TR 07-8, Department of Informatics, University of Lisbon (April 2007)
-
Bessani, A.N., Sousa, P., Correia, M., Neves, N.F., Verissimo, P.: Intrusion-tolerant protection for critical infrastructures. DI/FCUL TR 07-8, Department of Informatics, University of Lisbon (April 2007)
-
-
-
-
2
-
-
14644404940
-
Effective fault treatment for improving the dependability of COTS- and legacy-based applications
-
Bondavalli, A., Chiaradonna, S., Cotroneo, D., Romano, L.: Effective fault treatment for improving the dependability of COTS- and legacy-based applications. IEEE Transactions on Dependable and Secure Computing 1(4), 223-237 (2004)
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.4
, pp. 223-237
-
-
Bondavalli, A.1
Chiaradonna, S.2
Cotroneo, D.3
Romano, L.4
-
3
-
-
0033750717
-
Threshold-based mechanisms to discriminate transient from intermittent faults
-
Bondavalli, A., Chiaradonna, S., Di Giandomenico, F., Grandoni, F.: Threshold-based mechanisms to discriminate transient from intermittent faults. IEEE Transactions on Computers 49(3), 230-245 (2000)
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.3
, pp. 230-245
-
-
Bondavalli, A.1
Chiaradonna, S.2
Di Giandomenico, F.3
Grandoni, F.4
-
4
-
-
34047192955
-
NISCC good practice guide on firewall deployment for SCADA and process control networks
-
Technical report, NISCC, Revision 1.4 February
-
Byres, E., Karsch, J., Carter, J.: NISCC good practice guide on firewall deployment for SCADA and process control networks. Technical report, NISCC, Revision 1.4 (February 2005)
-
(2005)
-
-
Byres, E.1
Karsch, J.2
Carter, J.3
-
5
-
-
51849157666
-
-
North American Electric Reliability Council
-
North American Electric Reliability Council. Urgent action standard 1200 (2003)
-
(2003)
Urgent action standard 1200
-
-
-
6
-
-
38949108264
-
Hidden Markov models as a support for diagnosis: Formalization of the problem and synthesis of the solution
-
October
-
Daidone, A., Di Giandomenico, F., Bondavalli, A., Chiaradonna, S.: Hidden Markov models as a support for diagnosis: Formalization of the problem and synthesis of the solution. In: 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), pp. 245-256 (October 2006)
-
(2006)
25th IEEE Symposium on Reliable Distributed Systems (SRDS
, pp. 245-256
-
-
Daidone, A.1
Di Giandomenico, F.2
Bondavalli, A.3
Chiaradonna, S.4
-
7
-
-
84992227458
-
A proposed standard for role-based access control
-
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: A proposed standard for role-based access control. ACM Transactions on Information and System Security 4(3) (2001)
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
8
-
-
0002257571
-
Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. Dependable Computing for Critical Applications, IFIP WG 10.4
-
Gong, L., Lincoln, P., Rushby, J.: Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. Dependable Computing for Critical Applications, IFIP WG 10.4, preliminary proceedings 5, 79-90 (1995)
-
(1995)
preliminary proceedings
, vol.5
, pp. 79-90
-
-
Gong, L.1
Lincoln, P.2
Rushby, J.3
-
9
-
-
0016984825
-
Protection in operating systems
-
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM 19(8), 461-471 (1976)
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
10
-
-
46849103389
-
Access control for collaborative systems: A web services based approach
-
El Kalam, A.A., Deswarte, Y., Baina, A., Kaaniche, M.: Access control for collaborative systems: A web services based approach. In: Proceedings of the IEEE International Conference on Web Services, pp. 1064-1071 (2007)
-
(2007)
Proceedings of the IEEE International Conference on Web Services
, pp. 1064-1071
-
-
El Kalam, A.A.1
Deswarte, Y.2
Baina, A.3
Kaaniche, M.4
-
11
-
-
77952407814
-
Organization-based access control
-
June
-
El Kalam, A.A., Elbaida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miége, A., Saurel, C., Trouessin, G.: Organization-based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 277-288 (June 2003)
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks
, pp. 277-288
-
-
El Kalam, A.A.1
Elbaida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miége, A.7
Saurel, C.8
Trouessin, G.9
-
12
-
-
33750422800
-
Framework for SCADA security policy
-
Technical report, Sandia Corporation
-
Kilman, D., Stamp, J.: Framework for SCADA security policy. Technical report, Sandia Corporation (2005)
-
(2005)
-
-
Kilman, D.1
Stamp, J.2
-
13
-
-
51849108409
-
Foundations of Intrusion Tolerant Systems
-
Lala, J.H, ed, Los Alamitos
-
Lala, J.H. (ed.): Foundations of Intrusion Tolerant Systems. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE Computer Society Press
-
-
-
15
-
-
51849163500
-
-
International Standards Organization. ISO/IEC Standard 15408-1, Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model 3 (July 2005)
-
International Standards Organization. ISO/IEC Standard 15408-1, Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and general model 3 (July 2005)
-
-
-
-
16
-
-
33846674192
-
Optimal discrimination between transient and permanent faults
-
Pizza, M., Strigini, L., Bondavalli, A., Di Giandomenico, F.: Optimal discrimination between transient and permanent faults. In: Proceedings of the 3rd IEEE High Assurance System Engineering Symposium, pp. 214-223 (1998)
-
(1998)
Proceedings of the 3rd IEEE High Assurance System Engineering Symposium
, pp. 214-223
-
-
Pizza, M.1
Strigini, L.2
Bondavalli, A.3
Di Giandomenico, F.4
-
17
-
-
0036443316
-
Implementation of threshold-based diagnostic mechanisms for COTS-based applications
-
October 13-16
-
Romano, L., Bondavalli, A., Chiaradonna, S., Cotroneo, D.: Implementation of threshold-based diagnostic mechanisms for COTS-based applications. In: Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems, pp. 296-303, October 13-16 (2002)
-
(2002)
Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems
, pp. 296-303
-
-
Romano, L.1
Bondavalli, A.2
Chiaradonna, S.3
Cotroneo, D.4
-
18
-
-
36248955478
-
Online diagnosis and recovery: On the choice and impact of tuning parameters
-
Serafini, M., Bondavalli, A., Suri, N.: Online diagnosis and recovery: On the choice and impact of tuning parameters. IEEE Transactions on Dependable and Secure Computing 4(4), 295-312 (2007)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 295-312
-
-
Serafini, M.1
Bondavalli, A.2
Suri, N.3
-
20
-
-
27544466016
-
-
Sousa, P., Neves, N.F., Verissimo, P.: How resilient are distributed f fault/intrusion-tolerant systems? In: Proceedings of the IEEE International Conference on Dependable Systems and Networks (June 2005)
-
Sousa, P., Neves, N.F., Verissimo, P.: How resilient are distributed f fault/intrusion-tolerant systems? In: Proceedings of the IEEE International Conference on Dependable Systems and Networks (June 2005)
-
-
-
-
22
-
-
33747276448
-
Intrusion-tolerant middleware: The road to automatic security
-
Verissimo, P., Neves, N.F., Cachin, C., Poritz, J., Powell, D., Deswarte, Y., Stroud, R., Welch, I.: Intrusion-tolerant middleware: The road to automatic security. IEEE Security & Privacy 4(4), 54-62 (2006)
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 54-62
-
-
Verissimo, P.1
Neves, N.F.2
Cachin, C.3
Poritz, J.4
Powell, D.5
Deswarte, Y.6
Stroud, R.7
Welch, I.8
-
24
-
-
84982980436
-
A view-based access control model for CORBA
-
Vitek, J, ed, Secure Internet Programming, Springer, Heidelberg
-
Vitek, J., Jensen, C.: A view-based access control model for CORBA. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1603
-
-
Vitek, J.1
Jensen, C.2
-
25
-
-
51849090857
-
-
W3C. SOAP, version 1.2. W3C Recommendation June 2003
-
W3C. SOAP, version 1.2. W3C Recommendation (June 2003)
-
-
-
-
26
-
-
51849145550
-
-
W3C. Extensible markup language (XML). W3C Recommendation (February 2004)
-
W3C. Extensible markup language (XML). W3C Recommendation (February 2004)
-
-
-
-
27
-
-
51849093336
-
-
W3C. WSDL, version 2.0. W3C Candidate Recommendation March 2006
-
W3C. WSDL, version 2.0. W3C Candidate Recommendation (March 2006)
-
-
-
-
28
-
-
0031274594
-
Formally verified on-line diagnosis
-
Walter, C.J., Lincoln, P., Suri, N.: Formally verified on-line diagnosis. IEEE Transactions Software Engineering 23(11), 684-721 (1997)
-
(1997)
IEEE Transactions Software Engineering
, vol.23
, Issue.11
, pp. 684-721
-
-
Walter, C.J.1
Lincoln, P.2
Suri, N.3
|