-
1
-
-
12344308304
-
Basic Concepts and Taxonomy of Dependable and Secure Computing
-
Jan.-Mar
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, pp. 11-33, Jan.-Mar. 2004.
-
(2004)
IEEE Trans. Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
2
-
-
10644292998
-
Providing Intrusion Tolerance with ITUA
-
June
-
M. Cukier, T. Courtney, J. Lyons, H.V. Ramasamy, W.H. Sanders, M. Seri, M. Atighetchi, P. Rubel, C. Jones, F. Webber, P. Pal, R. Watro, and J. Gossett, "Providing Intrusion Tolerance with ITUA," Proc. Int'l Conf. Dependable Systems and Networks (DSN '02), June 2002.
-
(2002)
Proc. Int'l Conf. Dependable Systems and Networks (DSN '02)
-
-
Cukier, M.1
Courtney, T.2
Lyons, J.3
Ramasamy, H.V.4
Sanders, W.H.5
Seri, M.6
Atighetchi, M.7
Rubel, P.8
Jones, C.9
Webber, F.10
Pal, P.11
Watro, R.12
Gossett, J.13
-
3
-
-
60449115952
-
-
CERT Advisory ca-2003-04, http://cert.org/advisories/CA-2003-04. html, 2008.
-
CERT Advisory ca-2003-04, http://cert.org/advisories/CA-2003-04. html, 2008.
-
-
-
-
4
-
-
2342591623
-
Software Security for Open Source Systems
-
Jan./Feb
-
C. Cowen, "Software Security for Open Source Systems," /EEE Security and Privacy, pp. 38-45, Jan./Feb. 2003.
-
(2003)
EEE Security and Privacy
, pp. 38-45
-
-
Cowen, C.1
-
5
-
-
0026155432
-
Intrusion Tolerance in Distributed Computing Systems
-
91, pp, May
-
Y. Deswarte, L. Blain, and J.-C. Fabre, "Intrusion Tolerance in Distributed Computing Systems," Proc. Int'l Symp. Security and Privacy (S&P '91), pp. 110-121, May 1991.
-
(1991)
Proc. Int'l Symp. Security and Privacy (S&P
, pp. 110-121
-
-
Deswarte, Y.1
Blain, L.2
Fabre, J.-C.3
-
7
-
-
84942244236
-
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors
-
R. Chinchani et al., "A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors," Proc. Second IEEE Int'l Workshop Information Assurance (IWIA), 2003.
-
(2003)
Proc. Second IEEE Int'l Workshop Information Assurance (IWIA)
-
-
Chinchani, R.1
-
9
-
-
0034855080
-
Secure and Fault Tolerant Voting in Distributed Systems
-
Mar
-
B. Hardekopf, K. Kwiat, and S. Upadhyaya, "Secure and Fault Tolerant Voting in Distributed Systems," Proc. IEEE Aerospace Conf. '01, vol. 3, pp. 1117-1126, Mar. 2001.
-
(2001)
Proc. IEEE Aerospace Conf. '01
, vol.3
, pp. 1117-1126
-
-
Hardekopf, B.1
Kwiat, K.2
Upadhyaya, S.3
-
10
-
-
35248893508
-
The Willow Survivability Architecture
-
Oct
-
C. Knight, D. Heimbigner, A.L. Wolf, A. Carzaniga, J.C. Hill, P. Devanbu, and M. Gertz, "The Willow Survivability Architecture," Proc. Fourth Information Survivability Workshop (ISW '01), Oct. 2001.
-
(2001)
Proc. Fourth Information Survivability Workshop (ISW '01)
-
-
Knight, C.1
Heimbigner, D.2
Wolf, A.L.3
Carzaniga, A.4
Hill, J.C.5
Devanbu, P.6
Gertz, M.7
-
11
-
-
0032686475
-
Chameleon: A Software Infrastructure for Adaptive Fault Tolerance
-
June
-
Z. Kalbarczyk, R. K. Iyer, S. Bagchi, and K. Whisnant, "Chameleon: A Software Infrastructure for Adaptive Fault Tolerance," IEEE Trans. Parallel and Distributed Systems, vol. 10, no. 6, pp. 560-579, June 1999.
-
(1999)
IEEE Trans. Parallel and Distributed Systems
, vol.10
, Issue.6
, pp. 560-579
-
-
Kalbarczyk, Z.1
Iyer, R.K.2
Bagchi, S.3
Whisnant, K.4
-
14
-
-
18944373357
-
Combining Monitors for Runtime System Verification
-
Dec
-
J. Levy, H. Saidi, and T.E. Uribe, "Combining Monitors for Runtime System Verification," Elsevier Science Electronic Notes in Theoretical Computer Science, vol. 70, no. 4, Dec. 2002.
-
(2002)
Elsevier Science Electronic Notes in Theoretical Computer Science
, vol.70
, Issue.4
-
-
Levy, J.1
Saidi, H.2
Uribe, T.E.3
-
17
-
-
60449109833
-
-
Pax, http://pax.grsecurity.org, 2008.
-
(2008)
Pax, http
-
-
-
18
-
-
0024132223
-
The Delta-4 Approach to Dependability in Open Distributed Computing Systems
-
88, pp
-
D. Powell, G. Bonn, D. Seaton, P. Veríssimo, and F. Waeselynck, "The Delta-4 Approach to Dependability in Open Distributed Computing Systems," Proc. 18th IEEE Int'l Symp. Fault-Tolerant Computing Systems (FTCS '88), pp. 46-51, 1988.
-
(1988)
Proc. 18th IEEE Int'l Symp. Fault-Tolerant Computing Systems (FTCS
, pp. 46-51
-
-
Powell, D.1
Bonn, G.2
Seaton, D.3
Veríssimo, P.4
Waeselynck, F.5
-
19
-
-
60449102745
-
-
Malicious-and Accidental-Fault Tolerance for Internet Applications: Conceptual Model and Architecture, Technical Report 03011, Project IST-1999-11583 MAFTIA, Deliverable D21, D. Powell and R. Stroud, eds., LAAS-CNRS, Jan. 2003.
-
"Malicious-and Accidental-Fault Tolerance for Internet Applications: Conceptual Model and Architecture," Technical Report 03011, Project IST-1999-11583 MAFTIA, Deliverable D21, D. Powell and R. Stroud, eds., LAAS-CNRS, Jan. 2003.
-
-
-
-
20
-
-
60449097609
-
-
Snort, http://www.snort.org, 2008.
-
(2008)
Snort
-
-
-
21
-
-
60449102544
-
-
SQL Injection: Are Your Web Applications Vulnerable? SPI Laboratories, http://www.spidynamics.com/whitepapers/WhitepaperSQLInjection.pdf, 2008.
-
SQL Injection: Are Your Web Applications Vulnerable? SPI Laboratories, http://www.spidynamics.com/whitepapers/WhitepaperSQLInjection.pdf, 2008.
-
-
-
-
22
-
-
60449115456
-
-
Swig, http://www.swig.org, 2008.
-
(2008)
Swig
-
-
-
24
-
-
31344455537
-
An Adaptative Intrusion-Tolerant Server Architecture
-
A. Valdes, M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre, J. Levy, H. Saldi, V. Stavridou, and T. Uribe, "An Adaptative Intrusion-Tolerant Server Architecture," Proc. 10th Int'l Workshop Security Protocols, pp. 158-178, 2003.
-
(2003)
Proc. 10th Int'l Workshop Security Protocols
, pp. 158-178
-
-
Valdes, A.1
Almgren, M.2
Cheung, S.3
Deswarte, Y.4
Dutertre, B.5
Levy, J.6
Saldi, H.7
Stavridou, V.8
Uribe, T.9
-
26
-
-
0342410321
-
Survivable Information Storage Systems
-
Aug
-
J.J. Wylie, M.W. Bigrigg, J.D. Strunk, G.R. Ganger, H. Kiliccote, and P.K. Khosla, "Survivable Information Storage Systems," Computer, vol. 33, no. 8, pp. 61-68, Aug. 2000.
-
(2000)
Computer
, vol.33
, Issue.8
, pp. 61-68
-
-
Wylie, J.J.1
Bigrigg, M.W.2
Strunk, J.D.3
Ganger, G.R.4
Kiliccote, H.5
Khosla, P.K.6
-
27
-
-
0742317706
-
Scalable Intrusion Tolerance Architecture for Distributed Server
-
F. Wang, F. Gong, C. Sargor, K. Goseva, K. Trivedi, and F. Jou, "Scalable Intrusion Tolerance Architecture for Distributed Server," Proc. Second IEEE SMC Information Assurance Workshop, 2001.
-
(2001)
Proc. Second IEEE SMC Information Assurance Workshop
-
-
Wang, F.1
Gong, F.2
Sargor, C.3
Goseva, K.4
Trivedi, K.5
Jou, F.6
|