A survey on intrusion-tolerant system

被引:4
|
作者
机构
[1] Heo, Seondong
[2] Kim, Pyeong
[3] Shin, Yongjoo
[4] Lim, Jungmin
[5] Koo, Dongyoung
[6] Kim, Yonggon
[7] Kwon, Ohmin
[8] Yoon, Hyunsoo
来源
Yoon, H. (hyoon@nslab.kaist.ac.kr) | 1600年 / Korean Institute of Information Scientists and Engineers卷 / 07期
关键词
D O I
10.5626/JCSE.2013.7.4.242
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Intrusion-tolerant server architecture for survivable services
    Min, YJ
    JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 93 - 102
  • [32] A novel intrusion-tolerant approach for Internet access
    Wen, Yan
    Zhao, Jinjing
    Wang, Huaimin
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 485 - +
  • [33] Intrusion-tolerant server architecture for survivable services
    Min B.J.
    Journal of Supercomputing, 2005, 33 (01): : 93 - 102
  • [34] On the effects of finite memory on intrusion-tolerant systems
    Veronese, Giuliana Santos
    Correia, Miguel
    Lung, Lau Cheuk
    Verissimo, Paulo
    13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
  • [35] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems
    Antunes, Joao
    Neves, Nuno
    2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
  • [36] On the correctness of an intrusion-tolerant group communication protocol
    Layouni, M
    Hooman, J
    Tahar, S
    CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 231 - 246
  • [37] Survivable SCADA Via Intrusion-Tolerant Replication
    Kirsch, Jonathan
    Goose, Stuart
    Amir, Yair
    Wei, Dong
    Skare, Paul
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (01) : 60 - 70
  • [38] Intrusion-Tolerant Server Architecture for Survivable Services
    Byoung Min Joon
    The Journal of Supercomputing, 2005, 33 (1) : 93 - 102
  • [39] Intrusion-tolerant middleware -: The road to automatic security
    Verissimo, Paulo E.
    Neves, Nuno F.
    Cachin, Christian
    Poritz, Jonathan
    Powell, David
    Deswarte, Yves
    Stroud, Robert
    Welch, Ian
    IEEE SECURITY & PRIVACY, 2006, 4 (04) : 54 - 62
  • [40] Formal verification of an intrusion-tolerant group membership protocol
    Ramasamy, HV
    Cukier, M
    Sanders, WH
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (12): : 2612 - 2622