메뉴 건너뛰기




Volumn , Issue , 2006, Pages 289-304

An architecture for specification-based detection of semantic integrity violations in kernel dynamic data

Author keywords

[No Author keywords available]

Indexed keywords

DATA STRUCTURES; SEMANTICS; SPECIFICATION LANGUAGES; SPECIFICATIONS;

EID: 84991799247     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (135)

References (37)
  • 1
    • 85080362507 scopus 로고    scopus 로고
    • The Unified Modeling Language (UML). http://www.uml.org, 2005
    • The Unified Modeling Language (UML). http://www.uml.org, 2005.
  • 2
    • 85080409653 scopus 로고    scopus 로고
    • Trusted Computing Group (TCG). http://www.trustedcomputinggroup.org, 2005
    • Trusted Computing Group (TCG). http://www.trustedcomputinggroup.org, 2005.
  • 6
    • 0003587590 scopus 로고    scopus 로고
    • Recommendation REC-xpath-19991116, World Wide Web Consortium, November
    • J. Clark and S. Derose. XML Path Language (XPath) Version 1.0. Recommendation REC-xpath-19991116, World Wide Web Consortium, November 1999.
    • (1999) XML Path Language (XPath) Version 1.0
    • Clark, J.1    Derose, S.2
  • 10
  • 16
    • 0022099468 scopus 로고
    • The 5ESS(TM) switching system: Maintenance capabilities
    • July-August
    • G. Haugk, F. Lax, R. Royer, and J. Williams. The 5ESS(TM) switching system: Maintenance capabilities. AT & T Technical Journal, 64 part 2(6):1385 – 1416, July-August 1985.
    • (1985) AT & T Technical Journal , vol.64 , Issue.6 , pp. 1385-1416
    • Haugk, G.1    Lax, F.2    Royer, R.3    Williams, J.4
  • 18
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • Washington, D.C., August
    • R. Kennell and L. H. Jamieson. Establishing the Genuinity of Remote Computer Systems. In Proceedings of the 12th USENIX Security Symposium, pages 295–310, Washington, D.C., August 2003.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 295-310
    • Kennell, R.1    Jamieson, L.H.2
  • 21
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • Oakland, CA, May
    • C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach . In 1997 IEEE Symposium on Security and Privacy, Oakland, CA, May 1997.
    • (1997) 1997 IEEE Symposium on Security and Privacy
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 25
    • 1442309284 scopus 로고
    • On the reliability of the IBM MVS/XA operating system
    • S. Mourad and D. Andrews. On the Reliability of the IBM MVS/XA Operating System. IEEE Transactions on Software Engineering, 13(10):1135–1139, 1987.
    • (1987) IEEE Transactions on Software Engineering , vol.13 , Issue.10 , pp. 1135-1139
    • Mourad, S.1    Andrews, D.2
  • 31
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • San Diego, CA, August
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. In 13th USENIX Security Symposium, San Diego, CA, August 2004.
    • (2004) 13th USENIX Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 32
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • Washington, D.C., August
    • R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In 8th USENIX Security Symposium, pages 63–78, Washington, D.C., August 1999.
    • (1999) 8th USENIX Security Symposium , pp. 63-78
    • Sekar, R.1    Uppuluri, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.