-
1
-
-
3342935720
-
Extensible, scalable monitoring for clusters of computers
-
San Diego, CA, Oct
-
E. Anderson and D. Patterson. Extensible, scalable monitoring for clusters of computers. In Proceedings of Eleventh Systems Administration Conference (LISA '97), pages 9-16, San Diego, CA, Oct 1997.
-
(1997)
Proceedings of Eleventh Systems Administration Conference (LISA '97)
, pp. 9-16
-
-
Anderson, E.1
Patterson, D.2
-
2
-
-
84961692954
-
Instrumented connectors for mediating architecture interactions
-
Seattle, WA. Aug
-
R. Balzer. Instrumented connectors for mediating architecture interactions. DARPA Windows NT Workshop, Seattle, WA. http://www.dyncorp-is.com/darpa/meetings/win98aug/Balzerinstruments.html, Aug 1998.
-
(1998)
DARPA Windows NT Workshop
-
-
Balzer, R.1
-
3
-
-
0002459033
-
Survivability in the age of vulnerable systems
-
Nov
-
M. Barbacci. Survivability in the age of vulnerable systems. IEEE Computer, 29(11):8, Nov 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.11
, pp. 8
-
-
Barbacci, M.1
-
4
-
-
0024104130
-
GENESIS: An extensible database management system
-
Nov
-
D. Batory, J. Barnett, J. Garza, K. Smith, K. Tsukuda, B. Twichell, and T. Wise. GENESIS: An extensible database management system. IEEE Transactions on Software Engineering, SE-14(11):1711-1729, Nov 1988.
-
(1988)
IEEE Transactions on Software Engineering
, vol.SE-14
, Issue.11
, pp. 1711-1729
-
-
Batory, D.1
Barnett, J.2
Garza, J.3
Smith, K.4
Tsukuda, K.5
Twichell, B.6
Wise, T.7
-
5
-
-
0022563731
-
Review of point-to-point network routing algorithms
-
P. Bell and K. Jabbour. Review of point-to-point network routing algorithms. IEEE Communications Magazine, 24(1):34-38, 1986.
-
(1986)
IEEE Communications Magazine
, vol.24
, Issue.1
, pp. 34-38
-
-
Bell, P.1
Jabbour, K.2
-
6
-
-
80054992065
-
Extensibility, safety, and performance in the SPIN operating system
-
Copper Mountain Resort, CO, Dec
-
B. Bershad, S. Savage, P. Pardyak, E. Sirer, M. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility, safety, and performance in the SPIN operating system. In Proceedings of the 15th ACM Symposium on Operating Systems Principles, pages 267-284, Copper Mountain Resort, CO, Dec 1995.
-
(1995)
Proceedings of the 15th ACM Symposium on Operating Systems Principles
, pp. 267-284
-
-
Bershad, B.1
Savage, S.2
Pardyak, P.3
Sirer, E.4
Fiuczynski, M.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
7
-
-
0025531142
-
Adaptability experiments in the RAID distributed database system
-
B. Bhargava, K. Friesen, A. Helal, and J. Riedl. Adaptability experiments in the RAID distributed database system. In Proceedings of the 9th Symposium on Reliable Distributed Systems, pages 76-85, 1990.
-
(1990)
Proceedings of the 9th Symposium on Reliable Distributed Systems
, pp. 76-85
-
-
Bhargava, B.1
Friesen, K.2
Helal, A.3
Riedl, J.4
-
8
-
-
0032203011
-
Coyote: A system for constructing fine-grain configurable communication services
-
Nov
-
N. Bhatti, M. Hiltunen, R. Schlichting, and W. Chiu. Coyote: A system for constructing fine-grain configurable communication services. ACM Transactions on Computer Systems, 16(4):321-366, Nov 1998.
-
(1998)
ACM Transactions on Computer Systems
, vol.16
, Issue.4
, pp. 321-366
-
-
Bhatti, N.1
Hiltunen, M.2
Schlichting, R.3
Chiu, W.4
-
9
-
-
0013365091
-
Electronic quarantine: An automated intruder response tool
-
Orlando, FL, Oct
-
P. Brutch, T. Brutch, and U. Pooch. Electronic quarantine: An automated intruder response tool. In Proceedings of the Information Survivability Workshop 1998, pages 23-27, Orlando, FL, Oct 1998.
-
(1998)
Proceedings of the Information Survivability Workshop 1998
, pp. 23-27
-
-
Brutch, P.1
Brutch, T.2
Pooch, U.3
-
10
-
-
84947422743
-
Affordable fault tolerance through adaptation
-
J. Rolin, editor, Parallel and Distributed Processing, Lecture Notes in Computer Science Springer, Apr
-
I. Chang, M. Hiltunen, and R. Schlichting. Affordable fault tolerance through adaptation. In J. Rolin, editor, Parallel and Distributed Processing, Lecture Notes in Computer Science1388, pages 585-603. Springer, Apr 1998.
-
(1998)
, vol.1388
, pp. 585-603
-
-
Chang, I.1
Hiltunen, M.2
Schlichting, R.3
-
11
-
-
84961709697
-
-
Technical report, Department of Computer Science, University of Arizona, Tucson, AZ, In preparation
-
W.-K. Chen, M. Hiltunen, and R. Schlichting. Software architecture for building adaptive software. Technical report, Department of Computer Science, University of Arizona, Tucson, AZ, 1999. In preparation.
-
(1999)
Software Architecture for Building Adaptive Software
-
-
Chen, W.-K.1
Hiltunen, M.2
Schlichting, R.3
-
12
-
-
0025212376
-
An adaptive algorithm to ensure differential service in a token-ring network
-
M. Choi and C. Krishna. An adaptive algorithm to ensure differential service in a token-ring network. IEEE Transactions on Computers, C-39(1):19-33, 1990.
-
(1990)
IEEE Transactions on Computers
, vol.C-39
, Issue.1
, pp. 19-33
-
-
Choi, M.1
Krishna, C.2
-
14
-
-
70449712372
-
Survivability from a Sow's ear: The retrofit security requirement
-
Orlando, FL, Oct
-
C. Cowan and C. Pu. Survivability from a Sow's ear: The retrofit security requirement. In Proceedings of the Information Survivability Workshop 1998, pages 43-47, Orlando, FL, Oct 1998.
-
(1998)
Proceedings of the Information Survivability Workshop 1998
, pp. 43-47
-
-
Cowan, C.1
Pu, C.2
-
15
-
-
0003045134
-
A neural network component for an intrusion detection system
-
Oakland, CA
-
H. Debar, M. Becker, and D. Siboni. A neural network component for an intrusion detection system. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 1-11, Oakland, CA, 1992.
-
(1992)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 1-11
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
17
-
-
0024134751
-
Saturne: A distributed computing system which tolerates faults and intrusions
-
Hong Kong, Sep
-
Y. Deswarte, J.-C. Fabre, J.-M. Fray, D. Powell, and P.-G. Ranea. Saturne: A distributed computing system which tolerates faults and intrusions. In Proceedings of the Workshop on Future Trends of Distributed Computing Systems, pages 329-338, Hong Kong, Sep 1990.
-
(1990)
Proceedings of the Workshop on Future Trends of Distributed Computing Systems
, pp. 329-338
-
-
Deswarte, Y.1
Fabre, J.-C.2
Fray, J.-M.3
Powell, D.4
Ranea, P.-G.5
-
18
-
-
0003956839
-
-
version 1.0. Request for Comments (Standards Track) RFC 2246, Certicom, Jan
-
T. Dierks and C. Allen. The TLS protocol, version 1.0. Request for Comments (Standards Track) RFC 2246, Certicom, Jan 1999.
-
(1999)
The TLS Protocol
-
-
Dierks, T.1
Allen, C.2
-
19
-
-
0003449736
-
-
Technical Report Nov
-
R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead. Survivable network systems: An emerging discipline. Technical Report CMU/SEI-97-TR-013, Nov 1997.
-
(1997)
Survivable Network Systems: An Emerging Discipline
-
-
Ellison, R.1
Fisher, D.2
Linger, R.3
Lipson, H.4
Longstaff, T.5
Mead, N.6
-
20
-
-
84883516225
-
Exokernel: An operating system architecture for application-level resource management
-
Copper Mountain Resort, CO, Dec
-
D. Engler, M. Kaashoek, and J. O'Toole. Exokernel: An operating system architecture for application-level resource management. In Proceedings of the 15th ACM Symposium on Operating Systems Principles, pages 251-266, Copper Mountain Resort, CO, Dec 1995.
-
(1995)
Proceedings of the 15th ACM Symposium on Operating Systems Principles
, pp. 251-266
-
-
Engler, D.1
Kaashoek, M.2
O'Toole, J.3
-
21
-
-
0342867253
-
-
Technical Report Ref. 95-07, Center for Computer Security Research, University of Wollongong, Australia, May
-
M. Esmaili, R. Safavi-Naini, and J. Pieprzyk. Computer intrusion detection: A comparative survey. Technical Report Ref. 95-07, Center for Computer Security Research, University of Wollongong, Australia, May 1995.
-
(1995)
Computer Intrusion Detection: A Comparative Survey
-
-
Esmaili, M.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
22
-
-
84864878161
-
Designing secure and reliable applications using fragmentation-redundancy-scattering:An object-oriented approach
-
Berlin, Germany, Oct
-
J.-C. Fabre, Y. Deswarte, and B. Randell. Designing secure and reliable applications using fragmentation-redundancy-scattering:an object-oriented approach. In Proceedings of the 1st European Dependable Computing Conference, pages 21-38, Berlin, Germany, Oct 1994.
-
(1994)
Proceedings of the 1st European Dependable Computing Conference
, pp. 21-38
-
-
Fabre, J.-C.1
Deswarte, Y.2
Randell, B.3
-
23
-
-
0031250107
-
Pulsar: An extensible tool for monitoring large Unix sites
-
R. A. Finkel. Pulsar: An extensible tool for monitoring large Unix sites. Software Practice and Experience, 27(10):1163-1176, 1997.
-
(1997)
Software Practice and Experience
, vol.27
, Issue.10
, pp. 1163-1176
-
-
Finkel, R.A.1
-
24
-
-
0001728614
-
Adapting to network and client variation via on-demand, dynamic distillation
-
Oct
-
A. Fox, S. Gribble, E. Brewer, and E. Amir. Adapting to network and client variation via on-demand, dynamic distillation. In Proceedings of the 7th ASPLOS Conference, Oct 1996.
-
(1996)
Proceedings of the 7th ASPLOS Conference
-
-
Fox, A.1
Gribble, S.2
Brewer, E.3
Amir, E.4
-
25
-
-
2442621633
-
-
version 3.0. Internet-draft, Netscape Communications, Nov
-
A. Freier, P. Karlton, and P. Kocher. The SSL protocol, version 3.0. Internet-draft, Netscape Communications, Nov 1996.
-
(1996)
The SSL Protocol
-
-
Freier, A.1
Karlton, P.2
Kocher, P.3
-
27
-
-
0004136464
-
-
Technical Report Department of Computer Science, Cornell University, Jan
-
M. Hayden. The Ensemble system. Technical Report TR98-1662, Department of Computer Science, Cornell University, Jan 1998.
-
(1998)
The Ensemble System
-
-
Hayden, M.1
-
29
-
-
0032182406
-
Configuration management for highly-customizable software
-
Oct
-
M. Hiltunen. Configuration management for highly-customizable software. IEE Proceedings: Software, 145(5):180-188, Oct 1998.
-
(1998)
IEE Proceedings: Software
, vol.145
, Issue.5
, pp. 180-188
-
-
Hiltunen, M.1
-
31
-
-
53149110640
-
-
Technical Report Department of Computer Science, University of Arizona, Tucson, AZ, Apr
-
M. Hiltunen, S. Jaiprakash, and R. Schlichting. Exploiting fine-grain configurability for secure communication. Technical Report 99-08, Department of Computer Science, University of Arizona, Tucson, AZ, Apr 1999.
-
(1999)
Exploiting Fine-grain Configurability for Secure Communication
-
-
Hiltunen, M.1
Jaiprakash, S.2
Schlichting, R.3
-
34
-
-
0032675504
-
Real-time dependable channels: Customizing QoS attributes for distributed systems
-
Jun
-
M. Hiltunen, R. Schlichting, X. Han, M. Cardozo, and R. Das. Real-time dependable channels: Customizing QoS attributes for distributed systems. IEEE Transactions on Parallel and Distributed Systems, 10(6):600-612, Jun 1999.
-
(1999)
IEEE Transactions on Parallel and Distributed Systems
, vol.10
, Issue.6
, pp. 600-612
-
-
Hiltunen, M.1
Schlichting, R.2
Han, X.3
Cardozo, M.4
Das, R.5
-
35
-
-
0025722247
-
The x-kernel: An architecture for implementing network protocols
-
Jan
-
N. Hutchinson and L. Peterson. The x-kernel: An architecture for implementing network protocols. IEEE Transactions on Software Engineering, 17(1):64-76, Jan 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.1
, pp. 64-76
-
-
Hutchinson, N.1
Peterson, L.2
-
41
-
-
84976699318
-
The Byzantine generals problem
-
Jul
-
L. Lamport, R. Shostak, and P. M. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, Jul 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
M, P.3
-
43
-
-
0003690982
-
-
Technical report, SRI International, Mar
-
T. Lunt, R. Jagannathan, D. Anderson, C. Dodd, F. Gilham, C. Jalali, H. Javitz, P. Neuman, A. Tamaru, and A. Valdez. System design document: Next-generation intrusion detection expert system (NIDES). Technical report, SRI International, Mar 1993.
-
(1993)
System Design Document: Next-generation Intrusion Detection Expert System (NIDES)
-
-
Lunt, T.1
Jagannathan, R.2
Anderson, D.3
Dodd, C.4
Gilham, F.5
Jalali, C.6
Javitz, H.7
Neuman, P.8
Tamaru, A.9
Valdez, A.10
-
44
-
-
5544249434
-
Satool - A system administrator's cockpit, an implementation
-
Monterey, CA, Nov
-
T. Miller, C. Stirlen, and E. Nemeth. satool - A system administrator's cockpit, an implementation. In Proceedings of Seventh Systems Administration Conference (LISA '93), pages 119-129, Monterey, CA, Nov 1993.
-
(1993)
Proceedings of Seventh Systems Administration Conference (LISA '93)
, pp. 119-129
-
-
Miller, T.1
Stirlen, C.2
Nemeth, E.3
-
45
-
-
25144499774
-
Scout: A communications-oriented operating system
-
Nov
-
A. Montz, D. Mosberger, S. O'Malley, L. Peterson, T. Proebsting, and J. Hartman. Scout: a communications-oriented operating system. In Proceedings of the 1st Symposiumon Operating Design and Implementation (OSDI), page 200, Nov 1994.
-
(1994)
Proceedings of the 1st Symposiumon Operating Design and Implementation (OSDI)
, pp. 200
-
-
Montz, A.1
Mosberger, D.2
O'Malley, S.3
Peterson, L.4
Proebsting, T.5
Hartman, J.6
-
47
-
-
84961693190
-
-
Technical Report Department of Computer Science, University of Arizona, Tucson, AZ, May
-
H. Orman, S. O'Malley, R. Schroeppel, and D. Schwartz. Paving the road to network security or the value of small cobblestones. Technical Report 94-16, Department of Computer Science, University of Arizona, Tucson, AZ, May 1994.
-
(1994)
Paving the Road to Network Security or the Value of Small Cobblestones
-
-
Orman, H.1
O'Malley, S.2
Schroeppel, R.3
Schwartz, D.4
-
50
-
-
0032114960
-
Building adaptive systems using Ensemble
-
Jul
-
R. v. Renesse, K. Birman, M. Hayden, A. Vaysburd, and D. Karr. Building adaptive systems using Ensemble. Software Practice and Experience, 28(9):963-979, Jul 1998.
-
(1998)
Software Practice and Experience
, vol.28
, Issue.9
, pp. 963-979
-
-
Renesse, R.V.1
Birman, K.2
Hayden, M.3
Vaysburd, A.4
Karr, D.5
-
51
-
-
0030130161
-
Horus, a flexible group communication system
-
Apr
-
R. v. Renesse, K. Birman, and S. Maffeis. Horus, a flexible group communication system. Communications of the ACM, 39(4):76-83, Apr 1996.
-
(1996)
Communications of the ACM
, vol.39
, Issue.4
, pp. 76-83
-
-
Renesse, R.V.1
Birman, K.2
Maffeis, S.3
-
53
-
-
84961693151
-
PNNI global routing infrastructure protection
-
Orlando, FL, Oct
-
L. Ricciulli, S. De Capatini di Vimercati, P. Lincoln, and P. Samarati. PNNI global routing infrastructure protection. In Proceedings of the Information Survivability Workshop 1998, pages 123-126, Orlando, FL, Oct 1998.
-
(1998)
Proceedings of the Information Survivability Workshop 1998
, pp. 123-126
-
-
Ricciulli, L.1
De Capatini Di Vimercati, S.2
Lincoln, P.3
Samarati, P.4
-
54
-
-
0003774035
-
-
Technical Report Department of Computer Science, Cornell University, Dec
-
O. Rodeh, K. Birman, M. Hayden, Z. Xiao, and D. Dolev. The architecture and performance of security protocols in the Ensemble group communication system. Technical Report TR98-1703, Department of Computer Science, Cornell University, Dec 1998.
-
(1998)
The Architecture and Performance of Security Protocols in the Ensemble Group Communication System
-
-
Rodeh, O.1
Birman, K.2
Hayden, M.3
Xiao, Z.4
Dolev, D.5
-
56
-
-
0027608186
-
ADAPTIVE: A dynamically assembled protocol transformation, integration, and evaluation environment
-
Jun
-
D. Schmidt, D. Box, and T. Suda. ADAPTIVE: A dynamically assembled protocol transformation, integration, and evaluation environment. Concurrency: Practice and Experience, 5(4):269-286, Jun 1993.
-
(1993)
Concurrency: Practice and Experience
, vol.5
, Issue.4
, pp. 269-286
-
-
Schmidt, D.1
Box, D.2
Suda, T.3
-
57
-
-
33646449540
-
The common intrusion detection framework (CIDF)
-
Orlando, FL, Oct
-
S. Staniford-Chen, B. Tung, and D. Schnackenberg. The common intrusion detection framework (CIDF). In Proceedings of the Information Survivability Workshop 1998, pages 139-143, Orlando, FL, Oct 1998.
-
(1998)
Proceedings of the Information Survivability Workshop 1998
, pp. 139-143
-
-
Staniford-Chen, S.1
Tung, B.2
Schnackenberg, D.3
-
58
-
-
84961740133
-
Addressing survivability in the composable replaceable security services infrastructure
-
Orlando, FL, Oct
-
R. Thomas and R. Feiertag. Addressing survivability in the composable replaceable security services infrastructure. In Proceedings of the Information Survivability Workshop1998, pages 159-162, Orlando, FL, Oct 1998.
-
(1998)
Proceedings of the Information Survivability Workshop1998
, pp. 159-162
-
-
Thomas, R.1
Feiertag, R.2
-
60
-
-
85077745984
-
TCP WRAPPER: Network monitoring, access control, and booby traps
-
Baltimore,MD, Sep
-
W. Venema. TCP WRAPPER: Network monitoring, access control, and booby traps. In Proceedings of the 3rd Usenix UNIX Security Symposium, pages 85-92, Baltimore,MD, Sep 1992.
-
(1992)
Proceedings of the 3rd Usenix UNIX Security Symposium
, pp. 85-92
-
-
Venema, W.1
-
62
-
-
84961749639
-
Audit trail pattern analysis for detecting suspicious process behavior
-
Louvain-la-Neuve, Belgium, Sep
-
A. Wespi, M. Dacier, H. Debar, and M. Nassehi. Audit trail pattern analysis for detecting suspicious process behavior. In Proceedings of the 1st International Workshop on the Recent Advances on Intrusion Detection, Louvain-la-Neuve, Belgium, Sep 1998.
-
(1998)
Proceedings of the 1st International Workshop on the Recent Advances on Intrusion Detection
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
Nassehi, M.4
|