메뉴 건너뛰기




Volumn , Issue , 2008, Pages 95-107

Application-level isolation and recovery with solitude

Author keywords

Access control; Copy on write; File systems; Recovery; Taint analysis; Transactional file system

Indexed keywords

CASCADING EFFECTS; COPY-ON-WRITE; DATA DEPENDENCIES; ENTIRE SYSTEMS; ERROR-PRONE PROCESS; FILE SYSTEMS; FILE-SHARING; INTRUSION ANALYSIS; INTRUSION RECOVERIES; NAMESPACE; OPERATING SYSTEMS; PERSISTENT STATE; RECOVERY SYSTEMS; TAINT ANALYSIS; TRANSACTIONAL FILE SYSTEM;

EID: 59249099704     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352592.1352603     Document Type: Conference Paper
Times cited : (25)

References (39)
  • 5
    • 33846240903 scopus 로고    scopus 로고
    • Wu chang Feng, Wu chi Feng, David Maier, and Jim Snow. Automatic high-performance reconstruction and recovery
    • From Intrusion Detection to Self-Protection, April
    • Ashvin Goel, Wu chang Feng, Wu chi Feng, David Maier, and Jim Snow. Automatic high-performance reconstruction and recovery. Journal of Computer Networks, 51(5):1361-1377, April 2007. From Intrusion Detection to Self-Protection.
    • (2007) Journal of Computer Networks , vol.51 , Issue.5 , pp. 1361-1377
    • Goel, A.1
  • 13
    • 59249090440 scopus 로고    scopus 로고
    • John Leyden. Spyware poses as Firefox extension. urlhttp://www. theregister.co.uk/2006/07/26/firefox-malware-extension, July 2006.
    • John Leyden. Spyware poses as Firefox extension. urlhttp://www. theregister.co.uk/2006/07/26/firefox-malware-extension, July 2006.
  • 15
    • 59249097919 scopus 로고    scopus 로고
    • Linux. Man capabilities(7) in Linux man page. Confirming to POSIX.le.
    • Linux. Man capabilities(7) in Linux man page. Confirming to POSIX.le.
  • 18
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • February
    • James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium, February 2005.
    • (2005) Proceedings of the Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 19
    • 33244463191 scopus 로고    scopus 로고
    • Ext3cow: A time-shifting file system for regulatory compliance
    • May
    • Zachary N.J. Peterson and Randal Burns. Ext3cow: A time-shifting file system for regulatory compliance. ACM Transactions on Storage, 1(2):190-212, May 2005.
    • (2005) ACM Transactions on Storage , vol.1 , Issue.2 , pp. 190-212
    • Peterson, Z.N.J.1    Burns, R.2
  • 28
    • 34548029519 scopus 로고    scopus 로고
    • Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
    • Stephen Soltesz, Herbert Pötzl, Marc E. Fiuczynski, Andy Bavier, and Larry Peterson. Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors. In Proceedings of the EuroSys conference, pages 275-287, 2007.
    • (2007) Proceedings of the EuroSys conference , pp. 275-287
    • Soltesz, S.1    Pötzl, H.2    Fiuczynski, M.E.3    Bavier, A.4    Peterson, L.5
  • 37
    • 59249104473 scopus 로고    scopus 로고
    • Andy Watson and Paul Benn. Multiprotocol Data Access: NFS, CIFS, and HTTP. Technical Report TR3014, Network Appliance, Inc., 1999. http://www.netapp.com/tech--library/3014.html.
    • Andy Watson and Paul Benn. Multiprotocol Data Access: NFS, CIFS, and HTTP. Technical Report TR3014, Network Appliance, Inc., 1999. http://www.netapp.com/tech--library/3014.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.