-
1
-
-
84942262144
-
-
Linux security modules, http://lsm.immunix.org/.
-
-
-
-
5
-
-
85029688731
-
Transis: A communication sub-system for high avaliablity
-
Y. Amir, D. Dolev, S. Kramer, and D. Malki. Transis: A communication sub-system for high avaliablity. In FTCS-22, pages 76-84, 1992.
-
(1992)
FTCS-22
, pp. 76-84
-
-
Amir, Y.1
Dolev, D.2
Kramer, S.3
Malki, D.4
-
6
-
-
0019555124
-
Analysis of chordal ring network
-
April
-
B. W. Arden and H. Lee. Analysis of chordal ring network. IEEE Trans. Computers, 30:291-295, April 1981.
-
(1981)
IEEE Trans. Computers
, vol.30
, pp. 291-295
-
-
Arden, B.W.1
Lee, H.2
-
7
-
-
0022252695
-
The n-version approach to fault tolerant software
-
December
-
A. Avizienis. The n-version approach to fault tolerant software. IEEE Transactions on Software Engineering, 11(12):1491-1501, December 1985.
-
(1985)
IEEE Transactions on Software Engineering
, vol.11
, Issue.12
, pp. 1491-1501
-
-
Avizienis, A.1
-
8
-
-
0030092390
-
Checking for race conditions in file accesses
-
Spring
-
M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131-152, Spring 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
11
-
-
0036041421
-
An empirical study of operating systems errors
-
Chateau Lake Louise, Banff, Alberta, Canada, October
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. In Symposium on Operating Systems Principles (SOSP), pages 73-88. Chateau Lake Louise, Banff, Alberta, Canada, October 2001.
-
(2001)
Symposium on Operating Systems Principles (SOSP)
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
12
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: Attacks and defenses for the vulnerability of the decade. In DARPA Information Survivability Conference and Expo (DISCEX). Hilton Head Island, SC, January 2002.
-
DARPA Information Survivability Conference and Expo (DISCEX). Hilton Head Island, SC, January 2002
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
14
-
-
0016520329
-
An analysis of errors and their causes in system programs
-
June
-
A. Endres. An analysis of errors and their causes in system programs. IEEE Transactions on Software Engineering, SE-1(2):140-149, June 1975.
-
(1975)
IEEE Transactions on Software Engineering
, vol.SE-1
, Issue.2
, pp. 140-149
-
-
Endres, A.1
-
16
-
-
0030130053
-
Totem: A fault-tolerant multicast group communication system
-
L. E. M. et al. Totem: A fault-tolerant multicast group communication system. Communications of the ACM, 39(12):54-63, 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.12
, pp. 54-63
-
-
M, L.E.1
-
17
-
-
84942233564
-
-
J. Fox. Argus, http://staff.washington.edu/fox/argus/.
-
Argus
-
-
Fox, J.1
-
22
-
-
0032686475
-
Chameleon: A software infrastructure for adaptive fault tolerance
-
Z. Kalbarczyk, R. K. Iyer, S. Bagchi, and K. Whisnant. Chameleon: A software infrastructure for adaptive fault tolerance. IEEE Transactions on Parallel and Distributed Systems, 10(6):560-579, 1999.
-
(1999)
IEEE Transactions on Parallel and Distributed Systems
, vol.10
, Issue.6
, pp. 560-579
-
-
Kalbarczyk, Z.1
Iyer, R.K.2
Bagchi, S.3
Whisnant, K.4
-
24
-
-
18844368492
-
Kqueue: A generic and scalable event notification facility for freebsd
-
Monterey, CA
-
J. Lemon. Kqueue: A generic and scalable event notification facility for freebsd. In BSDCon 2000. Monterey, CA, 2000.
-
(2000)
BSDCon 2000
-
-
Lemon, J.1
-
25
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
October
-
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and John F. Farrell (National Security Agency). The inevitability of failure: The flawed assumption of security in modern computing environments. In 21st National Information Systems Security Conference, pages 303-314, October 1998.
-
(1998)
21st National Information Systems Security Conference
, pp. 303-314
-
-
National Security Agency1
Loscocco, P.A.2
Smalley, S.D.3
Muckelbauer, P.A.4
Taylor, R.C.5
Turner, S.J.6
Farrell, J.F.7
-
28
-
-
84942262152
-
Security analysis & design: A strategy that's both practical and generic
-
November
-
U. Nerurkar. Security analysis & design: A strategy that's both practical and generic. Dr. Dobbs Journal, featuring Computer Security, November 2000.
-
(2000)
Dr. Dobbs Journal, Featuring Computer Security
-
-
Nerurkar, U.1
-
29
-
-
84942262153
-
A protection mechanism for an intrusion detection system based on mandatory access control
-
August
-
T. Onabuta, T. Inoue, and M. Asaka. A protection mechanism for an intrusion detection system based on mandatory access control. Information Processing Society of Japan, 42(8), August 2001.
-
(2001)
Information Processing Society of Japan
, vol.42
, Issue.8
-
-
Onabuta, T.1
Inoue, T.2
Asaka, M.3
-
32
-
-
84939762209
-
Optimal loop topologies for distributed systems
-
Mexico City, Mexico, October 27-29
-
C. S. Raghavendra and M. Gerla. Optimal loop topologies for distributed systems. In Seventh Data Communications Symposium, pages 218-223. Mexico City, Mexico, October 27-29 1981.
-
(1981)
Seventh Data Communications Symposium
, pp. 218-223
-
-
Raghavendra, C.S.1
Gerla, M.2
-
33
-
-
0242539799
-
Model-carrying code (mcc): A new paradigm for mobile-code security
-
R. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, and S. A. Smolka. Model-carrying code (mcc): A new paradigm for mobile-code security. In New Security Paradigms Workshop (NSPW'01). Cloudcroft, New Mexico, September 2001.
-
New Security Paradigms Workshop (NSPW'01). Cloudcroft, New Mexico, September 2001
-
-
Sekar, R.1
Ramakrishnan, C.R.2
Ramakrishnan, I.V.3
Smolka, S.A.4
-
36
-
-
0018480001
-
A majority consensus approach to concurrency control for multiple copy databases
-
June
-
R. H. Thomas. A majority consensus approach to concurrency control for multiple copy databases. ACM Trans. on Database Systems, 4(2):180-209, June 1979.
-
(1979)
ACM Trans. on Database Systems
, vol.4
, Issue.2
, pp. 180-209
-
-
Thomas, R.H.1
|