-
1
-
-
77953268933
-
Building dependable distributed systems
-
Feb, APM Ltd, Cambridge, U.K
-
N. Edwards, "Building dependable distributed systems", ANSA, Feb., 1994, APM Ltd., Cambridge, U.K.
-
(1994)
ANSA
-
-
Edwards, N.1
-
2
-
-
0004141256
-
Fundamental concepts of dependability
-
No. 1145, LAAS-CNRS, Apr. 2001
-
A. Avizienis, J.-C. Laprie, and B. Randell, "Fundamental concepts of dependability", Research Report No. 1145, LAAS-CNRS, Apr. 2001.
-
Research Report
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
-
3
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Jan.-Mar
-
A. Avizienis, J-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing", IEEE Trans. Dependable and Secure Computing (TDSC), vol. 1, no. 1, Jan.-Mar. 2004, pp. 11-33.
-
(2004)
IEEE Trans. Dependable and Secure Computing (TDSC)
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
4
-
-
0033898550
-
Issues in defining, analyzing, refining, and specifying system dependability requirements
-
Edinburgh, Scotland, UK, Apr. 3-7
-
B. Melhart, and S. White, "Issues in defining, analyzing, refining, and specifying system dependability requirements", Proc. 7th IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2000), Edinburgh, Scotland, UK., Apr. 3-7, 2000, pp. 334-311.
-
(2000)
Proc. 7th IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2000)
, pp. 334-311
-
-
Melhart, B.1
White, S.2
-
5
-
-
0003752181
-
-
1st Ed, Prentice Hall, Inc, Upper Saddle River, NJ
-
D. Pradhan, Fault-Tolerant Computer System Design, 1st Ed, Prentice Hall, Inc., Upper Saddle River, NJ, 1996, pp. 5-14.
-
(1996)
Fault-Tolerant Computer System Design
, pp. 5-14
-
-
Pradhan, D.1
-
6
-
-
9144222269
-
Reflections on industry trends and experimental research in dependability
-
Apr.-Jun
-
D. Siewiorek, R. Chillarege, and Z. Kalbarczyk, "Reflections on industry trends and experimental research in dependability", IEEE Trans. Dependable and Secure Computing (TDSC), vol. 1, no. 2, Apr.-Jun. 2004, pp. 109-127.
-
(2004)
IEEE Trans. Dependable and Secure Computing (TDSC)
, vol.1
, Issue.2
, pp. 109-127
-
-
Siewiorek, D.1
Chillarege, R.2
Kalbarczyk, Z.3
-
7
-
-
84948681700
-
On the performance of a survivability architecture for networked computing systems
-
Jan
-
W.S. Harrison, A.W. Krings, N. Hanebutte, and M. McQueen, "On the performance of a survivability architecture for networked computing systems", Proc. 35th Hawaii International Conference on System Sciences, Jan. 2002.
-
(2002)
Proc. 35th Hawaii International Conference on System Sciences
-
-
Harrison, W.S.1
Krings, A.W.2
Hanebutte, N.3
McQueen, M.4
-
8
-
-
0028320282
-
Framework for network survivability performance
-
Jan
-
A. Zolfaghari and F.J. Kaudel, "Framework for network survivability performance", IEEE J. Sel. Areas Commun., vol. 12, no. 1, Jan. 1994, pp. 46-51.
-
(1994)
IEEE J. Sel. Areas Commun
, vol.12
, Issue.1
, pp. 46-51
-
-
Zolfaghari, A.1
Kaudel, F.J.2
-
9
-
-
0034448796
-
Security and survivability of distributed systems: An overview
-
Oct
-
K. Kyamakya, K. Jobmann, and M. Meincke, "Security and survivability of distributed systems: an overview", Proc. 21st Century Military Communications Conference (MILCOM 2000), vol. 1, Oct. 2000, pp. 449-454.
-
(2000)
Proc. 21st Century Military Communications Conference (MILCOM 2000)
, vol.1
, pp. 449-454
-
-
Kyamakya, K.1
Jobmann, K.2
Meincke, M.3
-
10
-
-
0033340363
-
Survivability: Protecting your critical systems
-
Nov.-Dec
-
R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, "Survivability: protecting your critical systems", IEEE Internet Computing Magn., vol. 3, no. 6, Nov.-Dec. 1999, pp. 55-63.
-
(1999)
IEEE Internet Computing Magn
, vol.3
, Issue.6
, pp. 55-63
-
-
Ellison, R.1
Fisher, D.2
Linger, R.3
Lipson, H.4
Longstaff, T.5
Mead, N.6
-
11
-
-
0014868186
-
Analysis and design of survivable networks
-
Oct
-
H. Frank, and I. T. Frisch, "Analysis and design of survivable networks", IEEE Trans. Commun. Technol., vol. 18, no. 5, Oct. 1970, pp. 501-519.
-
(1970)
IEEE Trans. Commun. Technol
, vol.18
, Issue.5
, pp. 501-519
-
-
Frank, H.1
Frisch, I.T.2
-
13
-
-
67651040944
-
-
Object Services and Consultant, Inc. Quality of Service (QoS), DARPA Contract DAAL01-95-C-01121997, Jan. 1997; http://www.objs.com/ Survivability/QoS and Survivability.htm
-
Object Services and Consultant, Inc. Quality of Service (QoS), DARPA Contract DAAL01-95-C-01121997, Jan. 1997; http://www.objs.com/ Survivability/QoS and Survivability.htm
-
-
-
-
14
-
-
0003953023
-
-
4th Ed, Addison-Wesley Publishing Company, NY
-
F. Halsall, Data Communications, Computer Networks and Open Systems, 4th Ed, Addison-Wesley Publishing Company, NY, 1996, pp. 13-18.
-
(1996)
Data Communications, Computer Networks and Open Systems
, pp. 13-18
-
-
Halsall, F.1
-
15
-
-
67651062736
-
-
Artech House Publishing, Inc, Norwood, MA
-
M. Liotine, Mission-Critical Network Planning, Artech House Publishing, Inc., Norwood, MA., 2003, pp. 31-59.
-
(2003)
Mission-Critical Network Planning
, pp. 31-59
-
-
Liotine, M.1
-
17
-
-
50249156870
-
Policy-Based Quality of Service Mapping in Distributed Systems
-
Apr. 15-19
-
M. Rudack, K. Jobmann, A. Pajares, and M. Esteve, "Policy-Based Quality of Service Mapping in Distributed Systems", Proc. IEEE/IFIP Network Operations and Management Symposium (NOMS2002), Apr. 15-19, 2002, pp. 947 - 949.
-
(2002)
Proc. IEEE/IFIP Network Operations and Management Symposium (NOMS2002)
, pp. 947-949
-
-
Rudack, M.1
Jobmann, K.2
Pajares, A.3
Esteve, M.4
-
18
-
-
0033698325
-
QoS Mapping along the Protocol Stack: Discussion and Preliminary Results
-
Jun. 18-22
-
L. DaSilva, "QoS Mapping along the Protocol Stack: Discussion and Preliminary Results", Proc. IEEE International Conference on Communications (ICC'00), vol. 2, Jun. 18-22, 2000, pp. 713-717.
-
(2000)
Proc. IEEE International Conference on Communications (ICC'00)
, vol.2
, pp. 713-717
-
-
DaSilva, L.1
-
19
-
-
0030656883
-
-
J.-F. Huard, and A. A. Lazar, On QOS Mapping in Multimedia Networks, Proc. The Twenty-First Annual International Computer Software and Applications Conference COMPSAC '97, Aug. 13-15, 1997, pp. 312, 317
-
J.-F. Huard, and A. A. Lazar, "On QOS Mapping in Multimedia Networks", Proc. The Twenty-First Annual International Computer Software and Applications Conference (COMPSAC '97), Aug. 13-15, 1997, pp. 312 - 317.
-
-
-
-
20
-
-
0029272289
-
The QoS Broker
-
N. K. and J. Smith, "The QoS Broker", IEEE Multimedia, vol. 2, no. 1, 1995, pp. 53-67.
-
(1995)
IEEE Multimedia
, vol.2
, Issue.1
, pp. 53-67
-
-
Smith, J.1
-
21
-
-
4344704022
-
QoS Specification Languages for Distributed Multimedia Applications: A Survey and Taxonomy
-
July-Sept
-
J. Jingwen, and K. Nahrstedt, "QoS Specification Languages for Distributed Multimedia Applications: A Survey and Taxonomy", IEEE Multimedia, vol. 11, no. 3, July-Sept. 2004, pp. 74- 87.
-
(2004)
IEEE Multimedia
, vol.11
, Issue.3
, pp. 74-87
-
-
Jingwen, J.1
Nahrstedt, K.2
-
22
-
-
46249114240
-
Dependability and complexity: Exploring ideas for studying open systems
-
19797 EN. Brussels, Belgium, EC Joint Research Centre
-
N. Kyriakopoulos and M. Wilikens, Dependability and complexity: exploring ideas for studying open systems, in Report EUR 19797 EN. Brussels, Belgium, EC Joint Research Centre, 2001.
-
(2001)
in Report EUR
-
-
Kyriakopoulos, N.1
Wilikens, M.2
-
23
-
-
0003414571
-
-
J. C. Lapie Ed, Springer-Verlag, New York, NY, Wien
-
J. C. Lapie (Ed.), Dependability: Basic Concepts and Terminology, Springer-Verlag, New York, NY, Wien, 1992.
-
(1992)
Dependability: Basic Concepts and Terminology
-
-
-
24
-
-
67651053347
-
-
IEEE Std 610 - IEEE Standard Computer Dictionary. A Compilation of IEEE Standard Computer Glossaries, 1990.
-
IEEE Std 610 - IEEE Standard Computer Dictionary. A Compilation of IEEE Standard Computer Glossaries, 1990.
-
-
-
-
25
-
-
84956760977
-
Toward a scalable method for quantifying aspects of fault tolerance, software assurance, and computer security
-
Nov
-
P. Koopman, "Toward a scalable method for quantifying aspects of fault tolerance, software assurance, and computer security", Proc. Computer Security, Dependability, and Assurance: From Needs to Solutions (CSDA'98), Nov. 1998, pp. 103-131.
-
(1998)
Proc. Computer Security, Dependability, and Assurance: From Needs to Solutions (CSDA'98)
, pp. 103-131
-
-
Koopman, P.1
-
26
-
-
84855865219
-
Quantitative evaluation of confidentiality by entropy calculation
-
Franconia, New Hampshire, Jun. 18-20, IEEE Comp. Soc
-
G. Trouessin, "Quantitative evaluation of confidentiality by entropy calculation", Proc. 4th IEEE Computer Security Foundations Workshop (CSFW'91), Franconia, New Hampshire, Jun. 18-20, 1991, IEEE Comp. Soc., 1999, pp.12-21.
-
(1991)
Proc. 4th IEEE Computer Security Foundations Workshop (CSFW'91)
, pp. 12-21
-
-
Trouessin, G.1
-
27
-
-
67651037693
-
-
J. von Neumann, Probabilistic logics and the synthesis of reliable organisms from unreliable components, in C. E. Shannon and J. McCarthy, Eds., Automata Studies, Annals of Math Studies, No. 34, Princeton: Princeton University Press, NJ, 1956, pp. 43-98.
-
J. von Neumann, Probabilistic logics and the synthesis of reliable organisms from unreliable components, in C. E. Shannon and J. McCarthy, Eds., Automata Studies, Annals of Math Studies, No. 34, Princeton: Princeton University Press, NJ, 1956, pp. 43-98.
-
-
-
-
28
-
-
84931382820
-
Design of Fault-Tolerant Computers
-
Thompson Books, Washington, D.C
-
A. Avizienis, "Design of Fault-Tolerant Computers", Proc. of 1967 Fall Joint Computer Conf., AFIPS Conf, vol. 31, Thompson Books, Washington, D.C., 1967, pp. 733-743.
-
(1967)
Proc. of 1967 Fall Joint Computer Conf., AFIPS Conf
, vol.31
, pp. 733-743
-
-
Avizienis, A.1
-
29
-
-
33746575004
-
A generalized model for network survivability
-
Atlanta, Georgia, Oct. 15-18
-
J. Koroma, W. Li, and D. Kazakos, "A generalized model for network survivability", Proc. Richard Tapia Celebration of Diversity in Computing Conference 2003 (TAPIA'03), Atlanta, Georgia, Oct. 15-18, 2003, ACM 2003, pp. 47-51.
-
(2003)
Proc. Richard Tapia Celebration of Diversity in Computing Conference 2003 (TAPIA'03)
, vol.ACM 2003
, pp. 47-51
-
-
Koroma, J.1
Li, W.2
Kazakos, D.3
-
30
-
-
67651050182
-
-
T1A1.2 Working Group on Network Survivability Performance, Technical Report on Enhanced Network Survivability Performance, Feb. 2001
-
T1A1.2 Working Group on Network Survivability Performance, Technical Report on Enhanced Network Survivability Performance, Feb. 2001.
-
-
-
-
31
-
-
67651022352
-
-
R. J. Ellison, R. C. Linger, T. Longstaff, and N. R. Mead, Case study in survivable network system analysis, (CMU/SEI-98-TR-014, ADA355070). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1998.
-
R. J. Ellison, R. C. Linger, T. Longstaff, and N. R. Mead, Case study in survivable network system analysis, (CMU/SEI-98-TR-014, ADA355070). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1998.
-
-
-
-
32
-
-
67651056582
-
-
R. Ellison, D. Fischer, R. Linger, H. Lipson, T. Longstaff, and N. Mead, Survivable network systems: an emerging discipline, (Report CMU/SEI-2001-TN-001), Pittsburgh, PA, Software Engineering Institute, Carnegie Mellon University, Mar. 2001.
-
R. Ellison, D. Fischer, R. Linger, H. Lipson, T. Longstaff, and N. Mead, Survivable network systems: an emerging discipline, (Report CMU/SEI-2001-TN-001), Pittsburgh, PA, Software Engineering Institute, Carnegie Mellon University, Mar. 2001.
-
-
-
-
33
-
-
84942246436
-
Towards a rigorous definition of information system survivability
-
Washington, DC, Apr
-
J.C. Knight, E. A. Strunk, and K J. Sullivan, "Towards a rigorous definition of information system survivability", Proc. DARPA Information Survivability Conference and Exposition (DISCEX 2003), Washington, DC, Vol. 1, Apr. 2003, pp. 78-89.
-
(2003)
Proc. DARPA Information Survivability Conference and Exposition (DISCEX 2003)
, vol.1
, pp. 78-89
-
-
Knight, J.C.1
Strunk, E.A.2
Sullivan, K.J.3
-
34
-
-
22944474786
-
-
Auerbach Publications, CRC Press LLC, NY
-
J. Wylder, Strategic Information Security, Auerbach Publications, CRC Press LLC, NY, 2004, pp. 47-61.
-
(2004)
Strategic Information Security
, pp. 47-61
-
-
Wylder, J.1
-
35
-
-
0004028417
-
-
Artech House, Inc, MA
-
J. E. Canavan, Fundamental of Network Security, Artech House, Inc., MA, 2001, pp.1-49.
-
(2001)
Fundamental of Network Security
, pp. 1-49
-
-
Canavan, J.E.1
-
36
-
-
85055233227
-
-
Auerbach Publications, CRC Press LLC, FL
-
T. R. Peltier, Information Security Risk Analysis, Auerbach Publications, CRC Press LLC, FL, 2001, pp.1-21.
-
(2001)
Information Security Risk Analysis
, pp. 1-21
-
-
Peltier, T.R.1
-
37
-
-
85017362404
-
-
2nd Ed, Wiley-Interscience Publications, John Wiley and Sons, Inc, NY
-
K. S. Trivedi, Probability and Statistics with Reliability, Queuing and Computer Science Application, 2nd Ed, Wiley-Interscience Publications, John Wiley and Sons, Inc., NY, 2002, pp. 1-4.
-
(2002)
Probability and Statistics with Reliability, Queuing and Computer Science Application
, pp. 1-4
-
-
Trivedi, K.S.1
-
38
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Jan.-Mar
-
D. Nicol, W. Sanders, and K. Trivedi, "Model-based evaluation: from dependability to security", IEEE Trans. Dependable and Secure Computing (TDSC), vol. 1, no. 1, Jan.-Mar., 2004, pp. 48-65.
-
(2004)
IEEE Trans. Dependable and Secure Computing (TDSC)
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.1
Sanders, W.2
Trivedi, K.3
-
39
-
-
0003976615
-
-
Wiley Computer Publishing, John Wiley and Sons, Inc, NY
-
D. Parker, Fighting Computer Crime: A New Framework for Protecting Information, Wiley Computer Publishing, John Wiley and Sons, Inc., NY, 1998, pp. 364-370.
-
(1998)
Fighting Computer Crime: A New Framework for Protecting Information
, pp. 364-370
-
-
Parker, D.1
-
40
-
-
84884727787
-
An integrated framework for security and dependability
-
Sep. 22-25, Charlottesville, Virginia, ACM Press
-
E. Jonsson, "An integrated framework for security and dependability", Proc. of the 1998 New Security Paradigm Workshop (NSPW '98), Sep. 22-25, 1998, Charlottesville, Virginia, ACM Press, 1999.
-
(1998)
Proc. of the 1998 New Security Paradigm Workshop (NSPW '98)
-
-
Jonsson, E.1
-
41
-
-
67651062738
-
DARPA's path to self-regenerative systems
-
Hilton Head Island, SC, Jun. 27-July 1
-
J. Lala, "DARPA's path to self-regenerative systems", Proc. 42nd IFIP WG Meeting, Workshop on Dependability and Survivability, Hilton Head Island, SC, Jun. 27-July 1, 2002.
-
(2002)
Proc. 42nd IFIP WG Meeting, Workshop on Dependability and Survivability
-
-
Lala, J.1
-
45
-
-
18444370876
-
A survey of anti-tamper technologies, CrossTalk
-
Nov
-
M. J. Attallah, E. D. Bryant, and M. R. Stytz, "A survey of anti-tamper technologies", CrossTalk - Journal of Defense Software Engineering, vol. 17, no.11, Nov. 2004, pp. 12-16.
-
(2004)
Journal of Defense Software Engineering
, vol.17
, Issue.11
, pp. 12-16
-
-
Attallah, M.J.1
Bryant, E.D.2
Stytz, M.R.3
-
46
-
-
85127993111
-
-
Boca Raton, FL, CRC Press
-
G. B. White, E. A. Fisch, and U. W. Pooch, Computer System and Network Security, Boca Raton, FL, CRC Press, 1996.
-
(1996)
Computer System and Network Security
-
-
White, G.B.1
Fisch, E.A.2
Pooch, U.W.3
-
47
-
-
0346236349
-
-
Art and Science, Addison Wesley, Pearson Education, Inc
-
M. Bishop, Computer Security: Art and Science, Addison Wesley, Pearson Education, Inc., 2003, pp. 95-184.
-
(2003)
Computer Security
, pp. 95-184
-
-
Bishop, M.1
-
48
-
-
84864878161
-
Designing Secure and Reliable Applications Using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
-
Proc. 1st European Dependable Computing Conf, EDCC-1, Berlin, Germany, Oct, Springer-Verlag
-
J.-C. Fabre, Y. Deswarte, and B. Randell, "Designing Secure and Reliable Applications Using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach", Proc. 1st European Dependable Computing Conf. (EDCC-1), Berlin, Germany, Oct. 1994, Springer-Verlag, LNCS 852, pp.21-38.
-
(1994)
LNCS
, vol.852
, pp. 21-38
-
-
Fabre, J.-C.1
Deswarte, Y.2
Randell, B.3
-
49
-
-
0031116991
-
Toward Systematic Design of Fault-Tolerant Systems
-
A. Avizienis, "Toward Systematic Design of Fault-Tolerant Systems", IEEE Computer, vol. 30, no. 4, 1997, pp.51-58.
-
(1997)
IEEE Computer
, vol.30
, Issue.4
, pp. 51-58
-
-
Avizienis, A.1
-
50
-
-
46249127439
-
-
Morgan Kaufmann Publishers, Inc, CA
-
James McCabe, Practical Computer Network Analysis and Design, Morgan Kaufmann Publishers, Inc., CA, 1998, pp. 1-9.
-
(1998)
Practical Computer Network Analysis and Design
, pp. 1-9
-
-
McCabe, J.1
-
51
-
-
12244292545
-
Practical architectures for survivable systems and networks
-
Technical report, Final Report, Phase Two, Project 1688, SRI International, Menlo Park, California, Jun
-
P. Neumann, Practical architectures for survivable systems and networks, Technical report, Final Report, Phase Two, Project 1688, SRI International, Menlo Park, California, Jun. 2000.
-
(2000)
-
-
Neumann, P.1
-
52
-
-
0037832529
-
-
25-28 May
-
L. Reznik, Which models should be applied to measure computer security and information assurance?, Proc. 12th IEEE International Conference on Fuzzy Systems (FUZZ'03), vol. 2, 25-28 May, 2003, pp. 1243-1248.
-
(2003)
Which models should be applied to measure computer security and information assurance?, Proc. 12th IEEE International Conference on Fuzzy Systems (FUZZ'03)
, vol.2
, pp. 1243-1248
-
-
Reznik, L.1
-
53
-
-
0032740585
-
-
D. Fisher, and H. Lipson, Emergent algorithms-A new method for enhancing survivability in unbounded systems, Proc. 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), Maui, HI, 5-8 Jan., IEEE Computer Society, Track7, 1999, pp. 10.
-
D. Fisher, and H. Lipson, "Emergent algorithms-A new method for enhancing survivability in unbounded systems", Proc. 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), Maui, HI, 5-8 Jan., IEEE Computer Society, vol. Track7, 1999, pp. 10.
-
-
-
-
54
-
-
0030686377
-
The four steps to achieve a reliable design
-
NAECON, Dayton, OH, Jul. 14th
-
F. E. Oliveto, "The four steps to achieve a reliable design", Proc. 1997 National Aerospace and Electronics Conference, (NAECON), vol. 1, Dayton, OH., Jul. 14th, 1997, pp. 446-453.
-
(1997)
Proc. 1997 National Aerospace and Electronics Conference
, vol.1
, pp. 446-453
-
-
Oliveto, F.E.1
-
55
-
-
12244289143
-
Information security system rating and ranking, Software Technology Support Center (STSC), CrossTalk
-
May
-
R. B. Vaughn Jr., A. Sira, and D. A. Dampier, "Information security system rating and ranking", Software Technology Support Center (STSC), CrossTalk - Journal of Defense Software Engineering, vol. 15, no. 5, May 2002, pp. 30-32.
-
(2002)
Journal of Defense Software Engineering
, vol.15
, Issue.5
, pp. 30-32
-
-
Vaughn Jr., R.B.1
Sira, A.2
Dampier, D.A.3
-
56
-
-
0020151729
-
Closed-Form Solutions of Performability
-
July
-
J. F. Meyer, "Closed-Form Solutions of Performability", in IEEE Trans. Comput., vol. C-31, no. 7, July 1982, pp.648-657.
-
(1982)
IEEE Trans. Comput
, vol.C-31
, Issue.7
, pp. 648-657
-
-
Meyer, J.F.1
-
57
-
-
50249097268
-
Dependability of complex open systems: A unifying concept for understanding internet-related issues
-
IEEE Comp. Soc. Press, Oct
-
N. Kyriakopoulos and M. Wilikens, "Dependability of complex open systems: a unifying concept for understanding internet-related issues", Proc. 3rd Information Survivability Workshop (ISW2000), IEEE Comp. Soc. Press, Oct. 2000.
-
(2000)
Proc. 3rd Information Survivability Workshop (ISW2000)
-
-
Kyriakopoulos, N.1
Wilikens, M.2
-
59
-
-
0020544329
-
Framework for a Taxonomy of Fault-Tolerance Attributes in. Computer Systems
-
Stockholm, Sweden, pp
-
A. Avizienis, "Framework for a Taxonomy of Fault-Tolerance Attributes in. Computer Systems", Proc. of the IEEE 10th Annual Int. Symp. on Computer Architecture archive, 1983, Stockholm, Sweden, pp.16-21.
-
(1983)
Proc. of the IEEE 10th Annual Int. Symp. on Computer Architecture archive
, pp. 16-21
-
-
Avizienis, A.1
-
61
-
-
67651053335
-
-
Telecommunications: Glossary of Telecommunication Terms, Federal Standard 1037C, August 7, 1996
-
Telecommunications: Glossary of Telecommunication Terms, Federal Standard 1037C, August 7, 1996
-
-
-
-
62
-
-
12344310162
-
Static vs. dynamic recovery models for survivable distributed systems
-
Maui, HI, 5-8 Jan, IEEE Comp. Soc. Press
-
J. Park, and P. Chandramohan, "Static vs. dynamic recovery models for survivable distributed systems", Proc. 37th Annual Hawaii International Conference on System Science, Maui, HI, 5-8 Jan. 2004, IEEE Comp. Soc. Press, 2004, pp. 55-63.
-
(2004)
Proc. 37th Annual Hawaii International Conference on System Science
, pp. 55-63
-
-
Park, J.1
Chandramohan, P.2
-
63
-
-
0035198938
-
Incorporation of security and fault tolerance mechanisms into real-time component-based distributed computing systems
-
Oct. 28-31, New Orleans, LA, IEEE Comp. Soc
-
K. H. Kim, "Incorporation of security and fault tolerance mechanisms into real-time component-based distributed computing systems", Proc. 20th Symposium on Reliable Distributed Systems (SRDS 2001), Oct. 28-31, New Orleans, LA, IEEE Comp. Soc., 2001, pp. 74-75.
-
(2001)
Proc. 20th Symposium on Reliable Distributed Systems (SRDS 2001)
, pp. 74-75
-
-
Kim, K.H.1
-
64
-
-
30544441474
-
Principled assuredly trustworthy composable architectures
-
SRI International, Menlo Park, California, Mar. 15
-
P. G. Neumann, Principled assuredly trustworthy composable architectures, (Emerging Draft of the) Final Report, SRI International, Menlo Park, California, Mar. 15, 2004.
-
(2004)
Emerging Draft of the) Final Report
-
-
Neumann, P.G.1
-
65
-
-
0036036577
-
Security attribute evaluation method: A cost-benefit approach
-
May 19-25, Orlando, Florida, ACM
-
S. A. Butler, "Security attribute evaluation method: a cost-benefit approach", Proc. of the 22nd International Conference on Software Engineering (ICSE2002), May 19-25, 2002, Orlando, Florida, ACM 2002, pp. 232-240.
-
(2002)
Proc. of the 22nd International Conference on Software Engineering (ICSE2002)
, pp. 232-240
-
-
Butler, S.A.1
-
66
-
-
0037600416
-
ITU-T QoS standards for IP-based networks
-
Jun
-
N. Seitz, "ITU-T QoS standards for IP-based networks", IEEE Communications Magazine, vol. 41, no. 6, Jun. 2003, pp. 82-89.
-
(2003)
IEEE Communications Magazine
, vol.41
, Issue.6
, pp. 82-89
-
-
Seitz, N.1
-
67
-
-
0003423820
-
-
2nd Ed, Addison-Wesley Publishing Company, NY
-
A. Leon-Garcia, Probability and Random Process for Electrical Engineering, 2nd Ed, Addison-Wesley Publishing Company, NY, 1994, pp. 150-155.
-
(1994)
Probability and Random Process for Electrical Engineering
, pp. 150-155
-
-
Leon-Garcia, A.1
-
68
-
-
0141892328
-
-
New Jersey, Prentice-Hall PTR
-
W. D. Grover, Mesh-Based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking, New Jersey, Prentice-Hall PTR, 2004, pp. 103-172.
-
(2004)
Mesh-Based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking
, pp. 103-172
-
-
Grover, W.D.1
-
69
-
-
67651025305
-
-
Fall
-
S. F. Andler, B. Lindstrom, and M.R. Barbacci, Distributed realtime systems: dependability in critical systems, software reliability, and security in critical systems, University of Skvde, Distributed Real-Time Systems Course, Fall 2002.
-
(2002)
Distributed realtime systems: Dependability in critical systems, software reliability, and security in critical systems, University of Skvde, Distributed Real-Time Systems Course
-
-
Andler, S.F.1
Lindstrom, B.2
Barbacci, M.R.3
-
70
-
-
0033325475
-
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
-
Sep- Oct
-
R. Ortalo, Y. Deswarte and M. Kaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security", IEEE Trans. Software Eng., vol. 25, no. 5, Sep- Oct. 1999, pp. 633-650.
-
(1999)
IEEE Trans. Software Eng
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaniche, M.3
-
71
-
-
0031386643
-
MEADEP and its application in dependability analysis for a nuclear power plant safety system
-
Nov. 11-14
-
Dong Tang, Myron Hecht, Xuegao An, and Robert Brill "MEADEP and its application in dependability analysis for a nuclear power plant safety system", Proc. 1997 Symposium on Nuclear Power Systems (SNPS'97), Nov. 11-14, 1997, pp. 916-920.
-
(1997)
Proc. 1997 Symposium on Nuclear Power Systems (SNPS'97)
, pp. 916-920
-
-
Tang, D.1
Hecht, M.2
An, X.3
Brill, R.4
-
72
-
-
0032257078
-
MEADEP - a dependability evaluation tool for engineers
-
Dec, IEEE Comp. Soc. Press
-
D. Tang, M. Hecht, J. Miller, and J. Handal, "MEADEP - a dependability evaluation tool for engineers", IEEE Trans. Reliability, Dec. 1998, IEEE Comp. Soc. Press, 1998, pp.443-450.
-
(1998)
IEEE Trans. Reliability
, pp. 443-450
-
-
Tang, D.1
Hecht, M.2
Miller, J.3
Handal, J.4
-
73
-
-
84883597425
-
Time as a metric for defence in survivable networks
-
Dec
-
K. Burbeck, S. G. Andres, S. Nadjm-Tehrani, M. Semling, and T. Dagonnier, "Time as a metric for defence in survivable networks", Proc. Work in Progress session of 24th IEEE Real-Time Systems Symposium (RTSS 2003), Dec. 2003.
-
(2003)
Proc. Work in Progress session of 24th IEEE Real-Time Systems Symposium (RTSS 2003)
-
-
Burbeck, K.1
Andres, S.G.2
Nadjm-Tehrani, S.3
Semling, M.4
Dagonnier, T.5
-
74
-
-
33747276448
-
Intrusion-Tolerant Middleware: The Road to Automatic Security
-
July-August
-
P. Verssimo, N. Neves, C. Cachin, J. Poritz, Y. Deswarte, D. Powell, R. Stroud, and I. Welch, "Intrusion-Tolerant Middleware: The Road to Automatic Security", IEEE Security and Privacy, vol. 4, no. 4, July-August 2006, pp.54-62.
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.4
, pp. 54-62
-
-
Verssimo, P.1
Neves, N.2
Cachin, C.3
Poritz, J.4
Deswarte, Y.5
Powell, D.6
Stroud, R.7
Welch, I.8
|