[PDF][PDF] Probabilistic validation of an intrusion-tolerant replication system

S Singh, M Cukier, WH Sanders - DSN, 2003 - researchgate.net
The popularity of the Internet, electronic commerce, corporate networks, and distributed
computing has caused a proliferation of critical distributed applications, the consequence of …

Internet security: an intrusion-tolerance approach

Y Deswarte, D Powell - Proceedings of the IEEE, 2006 - ieeexplore.ieee.org
The Internet has become essential to most enterprises and many private individuals.
However, both the network and computer systems connected to it are still too vulnerable and …

Security modeling and quantification of intrusion tolerant systems using attack‐response graph

BB Madan, KS Trivedi - Journal of High Speed Networks, 2004 - content.iospress.com
Increasing deployment of computer systems in critical applications has made study and
quantifiable analysis of the security aspects of these systems an important issue. Security …

Availability analysis and comparison of different intrusion-tolerant systems

C Wang, JF Ma - Content Computing: Advanced Workshop on Content …, 2004 - Springer
Based on the adopted redundancy techniques the intrusion-tolerant systems are classified
into three kinds: resource redundancy based systems, complete information redundancy …

[PDF][PDF] Self-defence of information systems in cyber-space–A critical overview

M Couture, R Charpentier… - NATO IST-091 …, 2010 - users.encs.concordia.ca
Nowadays information systems (ISs) that are utilized to support military operations are much
more complex than a decade ago. These new levels of complexity have brought important …

네트워크정보보호; 침입감내기술연구동향

최중섭, 이경구, 김홍근 - 정보보호학회지, 2003 - kiss.kstudy.com
침입감내기술은 기존의 침입차단이나 탐지기술에 의하여 해결될 수 없었던 알려지지 않은
취약점을 이용하는 공격에 의하여 발생하는 시스템의 피해를 방지하기 위한 기술이며, 중요 …

[图书][B] Situation-aware security for wireless ad hoc networks

S Yi - 2005 - search.proquest.com
Newly emerging ad hoc networking technology has enormous potential benefit for many
mission-critical applications. However, providing adequate security required for the target …

A self-healing mechanism for an intrusion tolerance system

B Park, K Park, S Kim - International Conference on Trust, Privacy and …, 2005 - Springer
The dependability analysis of an ITS (Intrusion Tolerance System–a system that performs
continuously minimal essential services even when the computer system is partially …

[PDF][PDF] A trustworthiness detector for intrusion-tolerant group communication systems

S Tanaraksiritavorn, S Mishra - Proceedings of the 2004 Hawaii …, 2004 - Citeseer
A trustworthiness detector in a group communication system raises a suspicion event,
whenever one or more group members can no longer be trusted. This suspicion event …

[PDF][PDF] Issues in Building Intrusion Tolerant Group Membership Protocols.

NP Subraveti, S Tanaraksiritavorn, S Mishra - PDCS, 2003 - Citeseer
Intrusion tolerant group membership protocols constitute an important part of an intrusion-
tolerant group communication system. These protocols maintain a consistent system-wide …