A survey on intrusion-tolerant system

被引:4
|
作者
机构
[1] Heo, Seondong
[2] Kim, Pyeong
[3] Shin, Yongjoo
[4] Lim, Jungmin
[5] Koo, Dongyoung
[6] Kim, Yonggon
[7] Kwon, Ohmin
[8] Yoon, Hyunsoo
来源
Yoon, H. (hyoon@nslab.kaist.ac.kr) | 1600年 / Korean Institute of Information Scientists and Engineers卷 / 07期
关键词
D O I
10.5626/JCSE.2013.7.4.242
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] An approach for availability evaluation of intrusion-tolerant server architectures
    Shi, Tingjun
    Zhao, Jinfeng
    Sang, Xia
    Yin, Xinchun
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 252 - 258
  • [42] From Analyzing Operating System Vulnerabilities to Designing Multiversion Intrusion-Tolerant Architectures
    Gorbenko, Anatoliy
    Romanovsky, Alexander
    Tarasyuk, Olga
    Biloborodov, Oleksandr
    IEEE TRANSACTIONS ON RELIABILITY, 2020, 69 (01) : 22 - 39
  • [43] Worm-IT -: A wormhole-based intrusion-tolerant group communication system
    Correia, Miguel
    Neves, Nuno Ferreira
    Lung, Lau Cheuk
    Verissimo, Paulo
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 178 - 197
  • [44] Intrusion-Tolerant Framework for Heterogeneous Wireless Sensor Networks
    Sliti, Maha
    Hamdi, Mohamed
    Boudriga, Noureddine
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 633 - 636
  • [45] Intrusion-tolerant group management in enclaves -: (Transcript of discussion)
    Saïdi, H
    SECURITY PROTOCOLS, 2002, 2467 : 213 - 216
  • [46] Formal specification and verification of the intrusion-Tolerant enclaves protocol
    Computer Science Department, McGill University, 3480 University Street, Montreal, QC, Canada
    不详
    不详
    Int. J. Netw. Secur., 2007, 3 (288-298):
  • [47] Availability analysis and comparison of different intrusion-tolerant systems
    Wang, C
    Ma, JF
    CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 161 - 166
  • [48] Dependability and performance evaluation of intrusion-tolerant server architectures
    Gupta, V
    Lam, V
    Ramasamy, HV
    Sanders, WH
    Singh, S
    DEPENDABLE COMPUTING, 2003, 2847 : 81 - 101
  • [49] Toward an Intrusion-Tolerant Power Grid: Challenges and Opportunities
    Babay, Amy
    Schultz, John
    Tantillo, Thomas
    Amir, Yair
    2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1321 - 1326
  • [50] Secure and Intrusion-tolerant Communication in Wireless Mesh Networks
    Guo Yuan-bo
    Hao Yao-hui
    Wang Chao
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 694 - +