메뉴 건너뛰기




Volumn 1, Issue , 2000, Pages 294-307

Survivability through customization and adaptability: The Cactus approach

Author keywords

[No Author keywords available]

Indexed keywords

FAULT TOLERANCE; FAULT TOLERANT COMPUTER SYSTEMS; INTRUSION DETECTION; NETWORK SECURITY;

EID: 84961725667     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2000.825033     Document Type: Conference Paper
Times cited : (49)

References (62)
  • 2
    • 84961692954 scopus 로고    scopus 로고
    • Instrumented connectors for mediating architecture interactions
    • Seattle, WA. Aug
    • R. Balzer. Instrumented connectors for mediating architecture interactions. DARPA Windows NT Workshop, Seattle, WA. http://www.dyncorp-is.com/darpa/meetings/win98aug/Balzerinstruments.html, Aug 1998.
    • (1998) DARPA Windows NT Workshop
    • Balzer, R.1
  • 3
    • 0002459033 scopus 로고    scopus 로고
    • Survivability in the age of vulnerable systems
    • Nov
    • M. Barbacci. Survivability in the age of vulnerable systems. IEEE Computer, 29(11):8, Nov 1996.
    • (1996) IEEE Computer , vol.29 , Issue.11 , pp. 8
    • Barbacci, M.1
  • 5
    • 0022563731 scopus 로고
    • Review of point-to-point network routing algorithms
    • P. Bell and K. Jabbour. Review of point-to-point network routing algorithms. IEEE Communications Magazine, 24(1):34-38, 1986.
    • (1986) IEEE Communications Magazine , vol.24 , Issue.1 , pp. 34-38
    • Bell, P.1    Jabbour, K.2
  • 8
    • 0032203011 scopus 로고    scopus 로고
    • Coyote: A system for constructing fine-grain configurable communication services
    • Nov
    • N. Bhatti, M. Hiltunen, R. Schlichting, and W. Chiu. Coyote: A system for constructing fine-grain configurable communication services. ACM Transactions on Computer Systems, 16(4):321-366, Nov 1998.
    • (1998) ACM Transactions on Computer Systems , vol.16 , Issue.4 , pp. 321-366
    • Bhatti, N.1    Hiltunen, M.2    Schlichting, R.3    Chiu, W.4
  • 10
    • 84947422743 scopus 로고    scopus 로고
    • Affordable fault tolerance through adaptation
    • J. Rolin, editor, Parallel and Distributed Processing, Lecture Notes in Computer Science Springer, Apr
    • I. Chang, M. Hiltunen, and R. Schlichting. Affordable fault tolerance through adaptation. In J. Rolin, editor, Parallel and Distributed Processing, Lecture Notes in Computer Science1388, pages 585-603. Springer, Apr 1998.
    • (1998) , vol.1388 , pp. 585-603
    • Chang, I.1    Hiltunen, M.2    Schlichting, R.3
  • 12
    • 0025212376 scopus 로고
    • An adaptive algorithm to ensure differential service in a token-ring network
    • M. Choi and C. Krishna. An adaptive algorithm to ensure differential service in a token-ring network. IEEE Transactions on Computers, C-39(1):19-33, 1990.
    • (1990) IEEE Transactions on Computers , vol.C-39 , Issue.1 , pp. 19-33
    • Choi, M.1    Krishna, C.2
  • 14
    • 70449712372 scopus 로고    scopus 로고
    • Survivability from a Sow's ear: The retrofit security requirement
    • Orlando, FL, Oct
    • C. Cowan and C. Pu. Survivability from a Sow's ear: The retrofit security requirement. In Proceedings of the Information Survivability Workshop 1998, pages 43-47, Orlando, FL, Oct 1998.
    • (1998) Proceedings of the Information Survivability Workshop 1998 , pp. 43-47
    • Cowan, C.1    Pu, C.2
  • 18
    • 0003956839 scopus 로고    scopus 로고
    • version 1.0. Request for Comments (Standards Track) RFC 2246, Certicom, Jan
    • T. Dierks and C. Allen. The TLS protocol, version 1.0. Request for Comments (Standards Track) RFC 2246, Certicom, Jan 1999.
    • (1999) The TLS Protocol
    • Dierks, T.1    Allen, C.2
  • 22
    • 84864878161 scopus 로고
    • Designing secure and reliable applications using fragmentation-redundancy-scattering:An object-oriented approach
    • Berlin, Germany, Oct
    • J.-C. Fabre, Y. Deswarte, and B. Randell. Designing secure and reliable applications using fragmentation-redundancy-scattering:an object-oriented approach. In Proceedings of the 1st European Dependable Computing Conference, pages 21-38, Berlin, Germany, Oct 1994.
    • (1994) Proceedings of the 1st European Dependable Computing Conference , pp. 21-38
    • Fabre, J.-C.1    Deswarte, Y.2    Randell, B.3
  • 23
    • 0031250107 scopus 로고    scopus 로고
    • Pulsar: An extensible tool for monitoring large Unix sites
    • R. A. Finkel. Pulsar: An extensible tool for monitoring large Unix sites. Software Practice and Experience, 27(10):1163-1176, 1997.
    • (1997) Software Practice and Experience , vol.27 , Issue.10 , pp. 1163-1176
    • Finkel, R.A.1
  • 25
    • 2442621633 scopus 로고    scopus 로고
    • version 3.0. Internet-draft, Netscape Communications, Nov
    • A. Freier, P. Karlton, and P. Kocher. The SSL protocol, version 3.0. Internet-draft, Netscape Communications, Nov 1996.
    • (1996) The SSL Protocol
    • Freier, A.1    Karlton, P.2    Kocher, P.3
  • 27
    • 0004136464 scopus 로고    scopus 로고
    • Technical Report Department of Computer Science, Cornell University, Jan
    • M. Hayden. The Ensemble system. Technical Report TR98-1662, Department of Computer Science, Cornell University, Jan 1998.
    • (1998) The Ensemble System
    • Hayden, M.1
  • 29
    • 0032182406 scopus 로고    scopus 로고
    • Configuration management for highly-customizable software
    • Oct
    • M. Hiltunen. Configuration management for highly-customizable software. IEE Proceedings: Software, 145(5):180-188, Oct 1998.
    • (1998) IEE Proceedings: Software , vol.145 , Issue.5 , pp. 180-188
    • Hiltunen, M.1
  • 35
    • 0025722247 scopus 로고
    • The x-kernel: An architecture for implementing network protocols
    • Jan
    • N. Hutchinson and L. Peterson. The x-kernel: An architecture for implementing network protocols. IEEE Transactions on Software Engineering, 17(1):64-76, Jan 1991.
    • (1991) IEEE Transactions on Software Engineering , vol.17 , Issue.1 , pp. 64-76
    • Hutchinson, N.1    Peterson, L.2
  • 51
  • 56
    • 0027608186 scopus 로고
    • ADAPTIVE: A dynamically assembled protocol transformation, integration, and evaluation environment
    • Jun
    • D. Schmidt, D. Box, and T. Suda. ADAPTIVE: A dynamically assembled protocol transformation, integration, and evaluation environment. Concurrency: Practice and Experience, 5(4):269-286, Jun 1993.
    • (1993) Concurrency: Practice and Experience , vol.5 , Issue.4 , pp. 269-286
    • Schmidt, D.1    Box, D.2    Suda, T.3
  • 58
    • 84961740133 scopus 로고    scopus 로고
    • Addressing survivability in the composable replaceable security services infrastructure
    • Orlando, FL, Oct
    • R. Thomas and R. Feiertag. Addressing survivability in the composable replaceable security services infrastructure. In Proceedings of the Information Survivability Workshop1998, pages 159-162, Orlando, FL, Oct 1998.
    • (1998) Proceedings of the Information Survivability Workshop1998 , pp. 159-162
    • Thomas, R.1    Feiertag, R.2
  • 60
    • 85077745984 scopus 로고
    • TCP WRAPPER: Network monitoring, access control, and booby traps
    • Baltimore,MD, Sep
    • W. Venema. TCP WRAPPER: Network monitoring, access control, and booby traps. In Proceedings of the 3rd Usenix UNIX Security Symposium, pages 85-92, Baltimore,MD, Sep 1992.
    • (1992) Proceedings of the 3rd Usenix UNIX Security Symposium , pp. 85-92
    • Venema, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.