A survey on intrusion-tolerant system

被引:4
|
作者
机构
[1] Heo, Seondong
[2] Kim, Pyeong
[3] Shin, Yongjoo
[4] Lim, Jungmin
[5] Koo, Dongyoung
[6] Kim, Yonggon
[7] Kwon, Ohmin
[8] Yoon, Hyunsoo
来源
Yoon, H. (hyoon@nslab.kaist.ac.kr) | 1600年 / Korean Institute of Information Scientists and Engineers卷 / 07期
关键词
D O I
10.5626/JCSE.2013.7.4.242
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Intrusion-tolerant group management in enclaves
    Dutertre, B
    Saïdi, H
    Stavridou, V
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
  • [22] A Scalable and Intrusion-tolerant Digital Time-stamping System
    Tulone, Daniela
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2357 - 2363
  • [23] Randomized intrusion-tolerant asynchronous services
    Moniz, Henrique
    Neves, Nuno Ferreira
    Correia, Miguel
    Verissimo, Paulo
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 568 - 577
  • [24] An architecture for adaptive intrusion-tolerant applications
    Pal, Partha
    Rubel, Paul
    Atighetchi, Michael
    Webber, Franklin
    Sanders, William H.
    Seri, Mouna
    Ramasamy, HariGovind
    Lyons, James
    Courtney, Tod
    Agbaria, Adnan
    Cukier, Michel
    Gossett, Jeanna
    Keidar, Idit
    SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354
  • [25] Building intrusion-tolerant secure software
    Zhang, T
    Zhuang, XT
    Pande, S
    CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266
  • [26] Model-based validation of an intrusion-tolerant information system
    Stevens, F
    Courtney, T
    Singh, S
    Agbaria, A
    Meyer, JF
    Sanders, WH
    Pal, P
    23RD IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 184 - 194
  • [27] Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System
    Shan, Guohou
    Zhao, Boxin
    Clavin, James R.
    Zhang, Haibin
    Duan, Sisi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 28 - 41
  • [28] A lightweight intrusion-tolerant overlay network
    Obelheiro, Rafael R.
    Fraga, Joni da Silva
    NINTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT AND COMPONENT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 496 - 503
  • [29] Evaluating Intrusion-Tolerant Certification Authority Systems
    Lin, Jingqiang
    Jing, Jiwu
    Liu, Peng
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2012, 28 (08) : 825 - 841
  • [30] Deploying Intrusion-Tolerant SCADA for the Power Grid
    Babay, Amy
    Schultz, John
    Tantillo, Thomas
    Beckley, Samuel
    Jordan, Eamon
    Ruddell, Kevin
    Jordan, Kevin
    Amir, Yair
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 328 - 335