메뉴 건너뛰기




Volumn , Issue , 2005, Pages 31-61

Attacks and countermeasures in software system security

Author keywords

Attack; Availability; Confidentiality; Integrity; Mobile agent system; Security

Indexed keywords

AVAILABILITY; COMPUTER SOFTWARE; NETWORK SECURITY;

EID: 84968912294     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1142/9789812775245_0002     Document Type: Chapter
Times cited : (2)

References (35)
  • 4
    • 84968910861 scopus 로고    scopus 로고
    • CERT Coordination Center Denial of Service
    • CERT Coordination Center Denial of Service, http://www.cert.org/tech-ttps/deniaLofservice.html.
  • 8
    • 84968831566 scopus 로고    scopus 로고
    • Firewall Software White Paper
    • Firewall Software White Paper, http://www.firewall-software.com/firewalLfaws/types-of-firewall.html.
  • 10
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • F. Hohl, "Time limited blackbox security: Protecting mobile agents from malicious hosts", Mobile Agents and Security, Lecture Notes in Computer Science 1419 (1998) 92-113.
    • (1998) Mobile Agents and Security, Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 16
    • 84968705257 scopus 로고    scopus 로고
    • Modeling and analysis of a secure mobile agent system using extended elementary object system
    • submitted to
    • L. Ma, J. J. P. Tsai and Z. Yu, "Modeling and analysis of a secure mobile agent system using extended elementary object system", submitted to IEEE Transaction on Software Engineering.
    • IEEE Transaction on Software Engineering
    • Ma, L.1    Tsai, J.J.P.2    Yu, Z.3
  • 25
    • 17644399080 scopus 로고    scopus 로고
    • Underlying technical models for information technology security
    • December
    • G. Stoneburner, "Underlying technical models for information technology security", NIST Special Publication 800-33, December 2001.
    • (2001) NIST Special Publication 800-33
    • Stoneburner, G.1
  • 31
    • 0003861085 scopus 로고    scopus 로고
    • Relating different semantics for object petri nets - Formal proofs and examples
    • University of Hamburg, Department for Computer Science, April
    • R. Valk, "Relating different semantics for object petri nets - Formal proofs and examples", Technical Report FBI-HH-B-226, University of Hamburg, Department for Computer Science, April 2000, pp. 1-50.
    • (2000) Technical Report FBI-HH-B-226 , pp. 1-50
    • Valk, R.1
  • 33
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic traces for mobile agents, mobile agents and security
    • G. Vigna, "Cryptographic traces for mobile agents, mobile agents and security", Lecture Notes in Computer Science ljl9 (1998) 137-150.
    • (1998) Lecture Notes in Computer Science ljl9 , pp. 137-150
    • Vigna, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.