-
1
-
-
84925838576
-
Why information security is hard - An economic perspective
-
John Wiley & Sons
-
R. Anderson. Why information security is hard - an economic perspective. In Proc. 17th Annual Computer Security Applications Conference, New Orleans, Louisianna, USA, December 2001. Also available in Chapt. 23 of R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems, John Wiley & Sons, 2001.
-
(2001)
Proc. 17th Annual Computer Security Applications Conference, New Orleans, Louisianna, USA, December 2001. Also Available in Chapt. 23 of R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems
-
-
Anderson, R.1
-
2
-
-
0004141256
-
Fundamental concepts of dependability
-
Boston, MA, October
-
A. Avizenis, J. Laprie, and B. Randell. Fundamental concepts of dependability. In Third Information Survivability Workshop, Boston, MA, October 2000.
-
(2000)
Third Information Survivability Workshop
-
-
Avizenis, A.1
Laprie, J.2
Randell, B.3
-
3
-
-
0141441473
-
Simplifying fault-tolerance: Providing abstraction of crash failures
-
May
-
R. Bazzi and G. Neiger. Simplifying fault-tolerance: providing abstraction of crash failures. JACM, 48(3), May 2001.
-
(2001)
JACM
, vol.48
, Issue.3
-
-
Bazzi, R.1
Neiger, G.2
-
5
-
-
0029506865
-
A comparison of performance evaluation process algebra and generalized stochastic petri nets
-
Durham, North Carolina, USA, October
-
S. Donatelli and J. Hillston. A comparison of performance evaluation process algebra and generalized stochastic petri nets. In Proc. Sixth Int. Workshop on Petri Nets and Performance Models, Durham, North Carolina, USA, October 1995.
-
(1995)
Proc. Sixth Int. Workshop on Petri Nets and Performance Models
-
-
Donatelli, S.1
Hillston, J.2
-
6
-
-
84898064661
-
PEPA nets: A structured performance modeling formalism
-
T. Field, G. Harrison, J. Bradley, and U. Harder, editors, LNCS London, UK, April Springer-Verlag
-
S. Gilmore, J. Hillston, and M. Ribaudo. PEPA nets: a structured performance modeling formalism. In T. Field, P.G. Harrison, J. Bradley, and U. Harder, editors, Proc. 12th Int. Conference on Modelling Tools and Techniques for Computer and Communication System Performance Evaluation., LNCS 2324, London, UK, April 2002. Springer-Verlag.
-
(2002)
Proc. 12th Int. Conference on Modelling Tools and Techniques for Computer and Communication System Performance Evaluation
, vol.2324
-
-
Gilmore, S.1
Hillston, J.2
Ribaudo, M.3
-
7
-
-
84964425047
-
Characterizing intrusion tolerant systems using a state transition model
-
Anaheim, California, USA, June
-
K. Goseva-Popstojanova, F. Wang, R. Wang, F. Gong, K. Vaidyanathan, K. Trivedi, and B. Muthusamy. Characterizing intrusion tolerant systems using a state transition model. In DARPA Information Survivability Conference and Exposition II DISCEX II, Anaheim, California, USA, June 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition II DISCEX II
-
-
Goseva-Popstojanova, K.1
Wang, F.2
Wang, R.3
Gong, F.4
Vaidyanathan, K.5
Trivedi, K.6
Muthusamy, B.7
-
8
-
-
0003581104
-
-
PhD thesis, University of Edinburgh, CST-107-94, also published by Cambridge University Press 1996
-
J. Hillston. A Compositional Approach to Performance Modeling. PhD thesis, University of Edinburgh, 1995. CST-107-94, also published by Cambridge University Press 1996.
-
(1995)
A Compositional Approach to Performance Modeling
-
-
Hillston, J.1
-
10
-
-
0031123773
-
A quantitative model of the security intrustion process based on attacker behavior
-
April
-
E. Jonsson and T. Olovssson. A quantitative model of the security intrustion process based on attacker behavior. IEEE Trans. on Software Engineering, 23(4), April 1997.
-
(1997)
IEEE Trans. On Software Engineering
, vol.23
, Issue.4
-
-
Jonsson, E.1
Olovssson, T.2
-
13
-
-
0003059084
-
-
Cépaduès-Editions, Toulouse
-
J.-C. Laprie, J. Arlat, J.-P. Blanquart, A. Costes, Y. Crouzet, Y. Deswarte, J.-C. Fabre, H. Guillermain, M. Kâniche, K. Kanoun, C. Mazet, D. Powell, C. Rabéjac, and P. Thévenod. Dependability Guidebook. Cépaduès-Editions, Toulouse, 1995.
-
(1995)
Dependability Guidebook
-
-
Laprie, J.-C.1
Arlat, J.2
Blanquart, J.-P.3
Costes, A.4
Crouzet, Y.5
Deswarte, Y.6
Fabre, J.-C.7
Guillermain, H.8
Kâniche, M.9
Kanoun, K.10
Mazet, C.11
Powell, D.12
Rabéjac, C.13
Thévenod, P.14
-
14
-
-
84974774507
-
Towards operational measures of computer security
-
B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J. Dobson, J. McDermid, and D. Gollmann. Towards operational measures of computer security. Journal of Computer Security, 2((2-3)), 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
McDermid, J.8
Gollmann, D.9
-
15
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Sept.-Oct
-
R. Ortalo, Y. Deswarte, and M. Kaâniche. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25(5):633-650, Sept.-Oct. 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaâniche, M.3
-
16
-
-
85117714986
-
Reflections on evaluating survivability: The APOD experiments
-
In Cambridge, MA, USA, April
-
P. Pal, M. Atighetchi, F. Webber, R. Schantz, and C. Jones. Reflections on evaluating survivability: The APOD experiments. In In Proc. 2nd IEEE International Symposium on Network Computing and Applications (NCA-03), Cambridge, MA, USA, April 2003.
-
(2003)
Proc. 2nd IEEE International Symposium on Network Computing and Applications (NCA-03)
-
-
Pal, P.1
Atighetchi, M.2
Webber, F.3
Schantz, R.4
Jones, C.5
-
17
-
-
17644419145
-
Malicious- And accidental-fault tolerance for internet applications: Conceptual model and architecture
-
available as LAAS-CNRS Rep. 01426 or University of Newcastle upon Tyne CS-TR-749), November
-
D. Powell and R. Stroud. Malicious- and accidental-fault tolerance for internet applications: Conceptual model and architecture. Technical report, MAFTIA deliverable D2 (available as LAAS-CNRS Rep. 01426 or University of Newcastle upon Tyne CS-TR-749), November 2001.
-
(2001)
Technical Report, MAFTIA Deliverable D2
-
-
Powell, D.1
Stroud, R.2
-
18
-
-
0024684041
-
With microscope and tweezers: The worm from MIT's perspective
-
June
-
J. Rochlis and M. Eichin. With microscope and tweezers: the worm from MIT's perspective. CACM, 32:689-698, June 1989.
-
(1989)
CACM
, vol.32
, pp. 689-698
-
-
Rochlis, J.1
Eichin, M.2
-
19
-
-
26044481272
-
Distributed trust: Supporting fault-tolerance and attack-tolerance
-
Cornell Computer Science Department, January for publication
-
F. Schneider and L. Zhou. Distributed trust: Supporting fault-tolerance and attack-tolerance. Technical Report TR 2004-1924, Cornell Computer Science Department, January 2004. submitted for publication.
-
(2004)
Technical Report TR 2004-1924
-
-
Schneider, F.1
Zhou, L.2
-
20
-
-
0034593315
-
Adversary work factor as a metric for information assurance
-
Ballycotton, County Cork, Ireland, September
-
G. Schudel and B Wood. Adversary work factor as a metric for information assurance. In Proc. New Security Paradigms Workshop, Ballycotton, County Cork, Ireland, September 2000.
-
(2000)
Proc. New Security Paradigms Workshop
-
-
Schudel, G.1
Wood, B.2
-
21
-
-
1542330099
-
Probablistic validation of an intrusion-tolerant replication system
-
San Francisco, California, USA, June
-
S. Singh, M. Cukier, and W. Sanders. Probablistic validation of an intrusion-tolerant replication system. In Proc. 2003 Int. Conf. on Dependable Systems and Networks DNS'03, San Francisco, California, USA, June 2003.
-
(2003)
Proc. 2003 Int. Conf. On Dependable Systems and Networks DNS'03
-
-
Singh, S.1
Cukier, M.2
Sanders, W.3
-
22
-
-
84992355353
-
-
stealth. Phrack, 0x0b(0x3d):Phile 0x0e, July
-
stealth. Kernel rootkit experiences. Phrack, 0x0b(0x3d):Phile 0x0e, July 2003.
-
(2003)
Kernel Rootkit Experiences
-
-
-
23
-
-
16244368460
-
Model-based validation of an intrusion-tolerant information system
-
Florianpolis, Brazil, October
-
F. Stevens, T. Courtney, S. Singh, A. Agbaria, J. Myer, W. Sanders, and P. Pal. Model-based validation of an intrusion-tolerant information system. In 23rd IEEE Int. Sym. on Reliable Distributed Systems (SRDS04), pages 184-194, Florianpolis, Brazil, October 2004.
-
(2004)
23rd IEEE Int. Sym. On Reliable Distributed Systems (SRDS04)
, pp. 184-194
-
-
Stevens, F.1
Courtney, T.2
Singh, S.3
Agbaria, A.4
Myer, J.5
Sanders, W.6
Pal, P.7
-
24
-
-
35248821244
-
Hiding intrusions: From the abnormal to the normal and beyond
-
F. Petitcolas, editor, Springer-Verlag
-
K. Tan, J. McHugh, and K. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In F. Petitcolas, editor, Information Hiding 2002 LNCS 2578, pages 1-17. Springer-Verlag, 2003.
-
(2003)
Information Hiding 2002 LNCS
, vol.2578
, pp. 1-17
-
-
Tan, K.1
McHugh, J.2
Killourhy, K.3
-
25
-
-
84976781807
-
Reflections on trusting trust
-
August
-
K. Thompson. Reflections on trusting trust. CACM, 27(8), August 1984.
-
(1984)
CACM
, vol.27
, Issue.8
-
-
Thompson, K.1
|