메뉴 건너뛰기




Volumn 7212 LNCS, Issue , 2012, Pages 78-93

Stable availability under denial of service attacks through formal patterns

Author keywords

availability; cloud computing; denial of service; formal patterns; meta object pattern; rewriting logic; statistical model checking

Indexed keywords

DENIAL OF SERVICE; FORMAL PATTERNS; META-OBJECT PATTERN; REWRITING LOGIC; STATISTICAL MODELS; META-OBJECTS; STATISTICAL MODEL CHECKING;

EID: 84859149082     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28872-2_6     Document Type: Conference Paper
Times cited : (39)

References (30)
  • 1
    • 35048861871 scopus 로고    scopus 로고
    • Just fast keying in the pi calculus
    • Schmidt, D. (ed.) LNCS Springer, Heidelberg
    • Abadi, M., Blanchet, B., Fournet, C.: Just Fast Keying in the Pi Calculus. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol. 2986, pp. 340-354. Springer, Heidelberg (2004)
    • (2004) ESOP 2004 , vol.2986 , pp. 340-354
    • Abadi, M.1    Blanchet, B.2    Fournet, C.3
  • 2
    • 0000920630 scopus 로고
    • A linguistic framework for dynamic composition of dependability protocols
    • Agha, G., Frolund, S., Panwar, R., Sturman, D.: A linguistic framework for dynamic composition of dependability protocols. IFIP, pp. 345-363 (1993)
    • (1993) IFIP , pp. 345-363
    • Agha, G.1    Frolund, S.2    Panwar, R.3    Sturman, D.4
  • 4
    • 33646416185 scopus 로고    scopus 로고
    • PMaude: Rewrite-based specification language for probabilistic object systems
    • Agha, G., Meseguer, J., Sen, K.: PMaude: Rewrite-based specification language for probabilistic object systems. ENTCS 153(2), 213-239 (2006)
    • (2006) ENTCS , vol.153 , Issue.2 , pp. 213-239
    • Agha, G.1    Meseguer, J.2    Sen, K.3
  • 6
    • 80053033779 scopus 로고    scopus 로고
    • PVESTA: A parallel statistical model checking and quantitative analysis tool
    • Corradini, A., Klin, B., Cîrstea, C. (eds.) LNCS Springer, Heidelberg
    • AlTurki, M., Meseguer, J.: PVESTA: A Parallel Statistical Model Checking and Quantitative Analysis Tool. In: Corradini, A., Klin, B., Cîrstea, C. (eds.) CALCO 2011. LNCS, vol. 6859, pp. 386-392. Springer, Heidelberg (2011)
    • (2011) CALCO 2011 , vol.6859 , pp. 386-392
    • Alturki, M.1    Meseguer, J.2
  • 7
    • 62849120147 scopus 로고    scopus 로고
    • Probabilistic modeling and analysis of DoS protection for the ASV protocol
    • AlTurki, M., Meseguer, J., Gunter, C.: Probabilistic modeling and analysis of DoS protection for the ASV protocol. ENTCS 234, 3-18 (2009)
    • (2009) ENTCS , vol.234 , pp. 3-18
    • Alturki, M.1    Meseguer, J.2    Gunter, C.3
  • 8
    • 46049086600 scopus 로고    scopus 로고
    • Modular preservation of safety properties by cookie-based DoS-protection wrappers
    • Barthe, G., de Boer, F.S. (eds.) LNCS Springer, Heidelberg
    • Chadha, R., Gunter, C.A., Meseguer, J., Shankesi, R., Viswanathan, M.: Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. In: Barthe, G., de Boer, F.S. (eds.) FMOODS 2008. LNCS, vol. 5051, pp. 39-58. Springer, Heidelberg (2008)
    • (2008) FMOODS 2008 , vol.5051 , pp. 39-58
    • Chadha, R.1    Gunter, C.A.2    Meseguer, J.3    Shankesi, R.4    Viswanathan, M.5
  • 10
    • 34548620529 scopus 로고    scopus 로고
    • Composing pattern-based components and verifying correctness
    • Dong, J., Alencar, P.S.C., Cowan, D.D., Yang, S.: Composing pattern-based components and verifying correctness. JSS 80, 1755-1769 (2007)
    • (2007) JSS , vol.80 , pp. 1755-1769
    • Dong, J.1    Alencar, P.S.C.2    Cowan, D.D.3    Yang, S.4
  • 14
    • 33750327688 scopus 로고    scopus 로고
    • DoS protection for reliably authenticated broadcast
    • Gunter, C., Khanna, S., Tan, K., Venkatesh, S.: DoS Protection for Reliably Authenticated Broadcast. In: NDSS (2004)
    • (2004) NDSS
    • Gunter, C.1    Khanna, S.2    Tan, K.3    Venkatesh, S.4
  • 16
    • 1442292328 scopus 로고    scopus 로고
    • An information flow method to detect denial of service vulnerabilities
    • Lafrance, S., Mullins, J.: An Information Flow Method to Detect Denial of Service Vulnerabilities. JUCS 9(11), 1350-1369 (2003)
    • (2003) JUCS , vol.9 , Issue.11 , pp. 1350-1369
    • Lafrance, S.1    Mullins, J.2
  • 17
    • 78649828899 scopus 로고    scopus 로고
    • Sensoria patterns: Augmenting service engineering
    • Margaria, T., Steffen, B. (eds.) CCIS Springer, Heidelberg
    • Wirsing, M., et al.: Sensoria Patterns: Augmenting Service Engineering. In: Margaria, T., Steffen, B. (eds.) ISoLA 2008. CCIS, vol. 17, pp. 170-190. Springer, Heidelberg (2008)
    • (2008) ISoLA 2008 , vol.17 , pp. 170-190
    • Wirsing, M.1
  • 18
    • 28144444844 scopus 로고    scopus 로고
    • Game-based analysis of denial-of-service prevention protocols
    • Mahimkar, A., Shmatikov, V.: Game-based Analysis of Denial-of-Service Prevention Protocols. In: IEEE CSFW, pp. 287-301 (2005)
    • (2005) IEEE CSFW , pp. 287-301
    • Mahimkar, A.1    Shmatikov, V.2
  • 19
    • 84889735281 scopus 로고    scopus 로고
    • September
    • MasterCard. MasterCard Statement (September 2011), http://www. businesswire.com/news/home/20101208005866/en/MasterCard-Statement
    • (2011) MasterCard. MasterCard Statement
  • 20
    • 84889749767 scopus 로고    scopus 로고
    • A formal framework and evaluation method for network denial of service
    • Meadows, C.: A Formal Framework and Evaluation Method for Network Denial of Service. In: IEEE CSFW (1999)
    • (1999) IEEE CSFW
    • Meadows, C.1
  • 21
    • 0027113376 scopus 로고
    • Conditional rewriting logic as a unified model of concurrency
    • Meseguer, J.: Conditional rewriting logic as a unified model of concurrency. TCS 96(1), 73-155 (1992)
    • (1992) TCS , vol.96 , Issue.1 , pp. 73-155
    • Meseguer, J.1
  • 22
    • 84944052797 scopus 로고    scopus 로고
    • Semantic models for distributed object reflection
    • Deng, T. (ed.) LNCS Springer, Heidelberg
    • Meseguer, J., Talcott, C.: Semantic Models for Distributed Object Reflection. In: Deng, T. (ed.) ECOOP 2002. LNCS, vol. 2374, pp. 1-36. Springer, Heidelberg (2002)
    • (2002) ECOOP 2002 , vol.2374 , pp. 1-36
    • Meseguer, J.1    Talcott, C.2
  • 24
    • 34047233385 scopus 로고    scopus 로고
    • Semantics and pragmatics of real-time maude
    • Ölveczky, P.C., Meseguer, J.: Semantics and pragmatics of Real-Time Maude. HOSC 20(1-2), 161-196 (2007)
    • (2007) HOSC , vol.20 , Issue.1-2 , pp. 161-196
    • Ölveczky, P.C.1    Meseguer, J.2
  • 26
    • 26444499465 scopus 로고    scopus 로고
    • On statistical model checking of stochastic systems
    • Etessami, K., Rajamani, S.K. (eds.) LNCS Springer, Heidelberg
    • Sen, K., Viswanathan, M., Agha, G.: On Statistical Model Checking of Stochastic Systems. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 266-280. Springer, Heidelberg (2005)
    • (2005) CAV 2005 , vol.3576 , pp. 266-280
    • Sen, K.1    Viswanathan, M.2    Agha, G.3
  • 27
  • 29
    • 84855207965 scopus 로고    scopus 로고
    • Statistical probabilistic model checking with a focus on time-bounded properties
    • Younes, H.L.S., Simmons, R.G.: Statistical probabilistic model checking with a focus on time-bounded properties. JIC 204(9), 1368-1409 (2006)
    • (2006) JIC , vol.204 , Issue.9 , pp. 1368-1409
    • Younes, H.L.S.1    Simmons, R.G.2
  • 30
    • 0025441368 scopus 로고
    • A specification and verification method for preventing denial of service
    • Yu, C.-F., Gligor, V.: A Specification and Verification Method for Preventing Denial of Service. IEEE T-SE 16(6), 581-592 (1990)
    • (1990) IEEE T-SE , vol.16 , Issue.6 , pp. 581-592
    • Yu, C.-F.1    Gligor, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.