-
2
-
-
70249094208
-
Towards Autonomic Enterprise Security: Self-Defending Platforms, Distributed Detection, and Adaptive Feedback
-
Agosta, J., et al.: Towards Autonomic Enterprise Security: Self-Defending Platforms, Distributed Detection, and Adaptive Feedback. Intel. Technology Journal 10(4) (2006)
-
(2006)
Intel. Technology Journal
, vol.10
, Issue.4
-
-
Agosta, J.1
-
3
-
-
27644497750
-
Policy-Based Management of Networked Computing Systems
-
Agrawal, D., Lee, K.-W., Lobo, J.: Policy-Based Management of Networked Computing Systems. IEEE Communications Magazine 43(10), 69-75 (2005)
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.10
, pp. 69-75
-
-
Agrawal, D.1
Lee, K.-W.2
Lobo, J.3
-
4
-
-
84991071863
-
Putting Together QoS and Security in Autonomic Pervasive Systems
-
Alia, M., Lacoste, M., He, R., Eliassen, F.: Putting Together QoS and Security in Autonomic Pervasive Systems. In: International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet) (2010)
-
(2010)
International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet)
-
-
Alia, M.1
Lacoste, M.2
He, R.3
Eliassen, F.4
-
5
-
-
38349054601
-
An Integrated Model for Access Control and Information Flow Requirements
-
Cervesato, I. (ed.) ASIAN 2007. Springer, Heidelberg
-
Ayed, S., Cuppens-Boulahia, N., Cuppens, F.: An Integrated Model for Access Control and Information Flow Requirements. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 111-125. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4846
, pp. 111-125
-
-
Ayed, S.1
Cuppens-Boulahia, N.2
Cuppens, F.3
-
6
-
-
49049087973
-
A Systematic Review and Comparison of Security Ontologies
-
Blanco, C., Lasheras, J., Valencia-Garcia, R., Fernandez-Medina, E., Alvarez, J., Piattini, M.: A Systematic Review and Comparison of Security Ontologies. In: International Conference on Availability, Reliability and Security (ARES) (2008)
-
(2008)
International Conference on Availability, Reliability and Security (ARES)
-
-
Blanco, C.1
Lasheras, J.2
Valencia-Garcia, R.3
Fernandez-Medina, E.4
Alvarez, J.5
Piattini, M.6
-
7
-
-
77950338523
-
Self-TUNe-ing of a J2EE Clustered Application
-
Chebaro, O., Broto, L., Bahsoun, J.-P., Hagimont, D.: Self-TUNe-ing of a J2EE Clustered Application. In: International Workshop on Engineering of Autonomic and Autonomous Systems (EASe) (2009)
-
(2009)
International Workshop on Engineering of Autonomic and Autonomous Systems (EASe)
-
-
Chebaro, O.1
Broto, L.2
Bahsoun, J.-P.3
Hagimont, D.4
-
8
-
-
0037232265
-
Security in an Autonomic Computing Environment
-
Chess, D., Palmer, C., White, S.: Security in an Autonomic Computing Environment. IBM Systems Journal 42(1), 107-118 (2003)
-
(2003)
IBM Systems Journal
, vol.42
, Issue.1
, pp. 107-118
-
-
Chess, D.1
Palmer, C.2
White, S.3
-
9
-
-
33845537277
-
Self-protection for Distributed Component-Based Applications
-
Datta, A.K., Gradinariu, M. (eds.) SSS 2006. Springer, Heidelberg
-
Claudel, B., De Palma, N., Lachaize, R., Hagimont, D.: Self-protection for Distributed Component-Based Applications. In: Datta, A.K., Gradinariu, M. (eds.) SSS 2006. LNCS, vol. 4280, pp. 184-198. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4280
, pp. 184-198
-
-
Claudel, B.1
De Palma, N.2
Lachaize, R.3
Hagimont, D.4
-
10
-
-
49049096753
-
Context Ontology for Secure Interoperability
-
Coma, C., Cuppens-Boulahia, N., Cuppens, F., Cavalli, A.R.: Context Ontology for Secure Interoperability. In: International Conference on Availability, Reliability and Security (ARES) (2008)
-
(2008)
International Conference on Availability, Reliability and Security (ARES)
-
-
Coma, C.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Cavalli, A.R.4
-
12
-
-
63249101412
-
An Ontology-based Approach to React to Network Attacks
-
Cuppens, N., Cuppens, F., Lopez de Vergara, J., Guerra, J., Debar, H., Vazquez, E.: An Ontology-based Approach to React to Network Attacks. In: International Conference on Risk and Security of Internet and Systems (CRiSIS) (2008)
-
(2008)
International Conference on Risk and Security of Internet and Systems (CRiSIS)
-
-
Cuppens, N.1
Cuppens, F.2
Lopez De Vergara, J.3
Guerra, J.4
Debar, H.5
Vazquez, E.6
-
13
-
-
33746455182
-
Using Contextual Security Policies for Threat Response
-
Büschkes, R., Laskov, P. (eds.) DIMVA 2006. Springer, Heidelberg
-
Debar, H., Thomas, Y., Boulahia-Cuppens, N., Cuppens, F.: Using Contextual Security Policies for Threat Response. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 109-128. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4064
, pp. 109-128
-
-
Debar, H.1
Thomas, Y.2
Boulahia-Cuppens, N.3
Cuppens, F.4
-
16
-
-
78249285909
-
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
-
He, R., Lacoste, M., Leneutre, J.: Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection. In: IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP) (2010)
-
(2010)
IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP)
-
-
He, R.1
Lacoste, M.2
Leneutre, J.3
-
18
-
-
62749155242
-
Security Ontology for Annotating Resources
-
Kim, A., Luo, J., Kang, M.: Security Ontology for Annotating Resources. In: International Conference on Ontologies, Databases, and Application of Semantics, ODBASE (2005)
-
(2005)
International Conference on Ontologies, Databases, and Application of Semantics, ODBASE
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
19
-
-
60849133598
-
A Component-Based Policy-Neutral Architecture for Kernel-Level Access Control
-
Lacoste, M., Jarboui, T., He, R.: A Component-Based Policy-Neutral Architecture for Kernel-Level Access Control. Annals of Telecommunications 64(1-2), 121-146 (2009)
-
(2009)
Annals of Telecommunications
, vol.64
, Issue.1-2
, pp. 121-146
-
-
Lacoste, M.1
Jarboui, T.2
He, R.3
-
20
-
-
33745167684
-
When and How to Develop Domain-Specific Languages
-
Mernik, M., Heering, J., Sloane, A.: When and How to Develop Domain-Specific Languages. ACM Computing Surveys 37(4), 316-344 (2005)
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.4
, pp. 316-344
-
-
Mernik, M.1
Heering, J.2
Sloane, A.3
-
21
-
-
33646181776
-
Weaving Executability into Object-Oriented Meta-languages
-
Briand, L.C., Williams, C. (eds.) MoDELS 2005. Springer, Heidelberg
-
Muller, P.-A., Fleurey, F., Jézéquel, J.-M.: Weaving Executability into Object-Oriented Meta-languages. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 264-278. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3713
, pp. 264-278
-
-
Muller, P.-A.1
Fleurey, F.2
Jézéquel, J.-M.3
-
22
-
-
77954934078
-
A Survey of Access Control Models
-
NIST. A Survey of Access Control Models. In: NIST Privilege (Access) Management Workshop (2009), http://csrc.nist.gov/news-events/privilege- management-workshop/
-
(2009)
NIST Privilege (Access) Management Workshop
-
-
-
23
-
-
71049117263
-
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
-
González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. Springer, Heidelberg
-
Serrano, M., van der Meer, S., Strassner, J., Paoli, S., Kerr, A., Storni, C.: Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. LNCS, vol. 5586, pp. 249-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5586
, pp. 249-267
-
-
Serrano, M.1
Van Der Meer, S.2
Strassner, J.3
Paoli, S.4
Kerr, A.5
Storni, C.6
-
24
-
-
34548158488
-
An Ontology for Network Security Attacks
-
Manandhar, S., Austin, J., Desai, U., Oyanagi, Y., Talukder, A.K. (eds.) AACC 2004. Springer, Heidelberg
-
Simmonds, A., Sandilands, P., van Ekert, L.: An Ontology for Network Security Attacks. In: Manandhar, S., Austin, J., Desai, U., Oyanagi, Y., Talukder, A.K. (eds.) AACC 2004. LNCS, vol. 3285, pp. 317-323. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3285
, pp. 317-323
-
-
Simmonds, A.1
Sandilands, P.2
Van Ekert, L.3
-
25
-
-
48049099174
-
The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking
-
Strassner, J., de Souza, J.N., Raymer, D., Samudrala, S., Davy, S., Barrett, K.: The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking. In: Latin American Network Operations and Management Symposium (LANOMS) (2007)
-
(2007)
Latin American Network Operations and Management Symposium (LANOMS)
-
-
Strassner, J.1
De Souza, J.N.2
Raymer, D.3
Samudrala, S.4
Davy, S.5
Barrett, K.6
-
26
-
-
67650680215
-
Ponder2: A Policy System for Autonomous Pervasive Environments
-
Twidle, K., Dulay, N., Lupu, E., Sloman, M.: Ponder2: A Policy System for Autonomous Pervasive Environments. In: International Conference on Autonomic and Autonomous Systems (ICAS) (2009)
-
(2009)
International Conference on Autonomic and Autonomous Systems (ICAS)
-
-
Twidle, K.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
27
-
-
26944484588
-
Modeling Computer Attacks: An Ontology for Intrusion Detection
-
Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. Springer, Heidelberg
-
Undercoffer, J., Joshi, A., Pinkston, J.: Modeling Computer Attacks: An Ontology for Intrusion Detection. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 113-135. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2820
, pp. 113-135
-
-
Undercoffer, J.1
Joshi, A.2
Pinkston, J.3
-
28
-
-
0001813087
-
Domain-Specific Languages: An Annotated Bibliography
-
van Deursen, A., Klint, P., Visser, J.: Domain-Specific Languages: An Annotated Bibliography. ACM SIGPLAN Notices 35(6), 26-36 (2000)
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.6
, pp. 26-36
-
-
Van Deursen, A.1
Klint, P.2
Visser, J.3
|