References
- DARPA OASIS project home page, http://www.darpa.mil/ipto/research/oasis/
- 박상서, 정보전 대응체계 구축 현황, WISC2000 튜토리얼 자료집, 2000
- http://www.afrlsn.afrl.af.mil/LA&S_topics.htmll#ITS
- http://www.darpa.mil/ipto/research/oasis/demval-goals.html
- Gergory R. Ganger et. al., Survivable Storge Systems, Procceedings of DISCEX2001, 2001
- Katerina Goseva-Popstojanova et. al., Characterizing Intrusion Tolerant Systems Using a State Transition Model, Proceedings of DISCEX2001, 2001 https://doi.org/10.1109/DISCEX.2001.932173
- 유찬수, 리눅스 클러스터링, 정보과학회지, 제18권 제2호, 2000
- Gary McGraw et. al., Securing Java, Wiley, pp.38-48, 1999
- Marcelo Tallis, et.al., 'Document Integrity through Mediated Interfaces,' Proceedings of DISCEX2001, 2001
- Peng Liu, et. al., Intrusion Tolerant Database Systems, Technical Report, Dept.of Info.Systems, Univ.of Maryland, Baltimore County, 2001
- Partha P. Pal, et. al., Defense-Enabling Using Advanced Middleware: An Example, Proceedings of MILCOM2001, 2001 https://doi.org/10.1109/MILCOM.2001.985770
- Amjad Umar, et. al., Intrusion Tolerant Middleware, Proceedings of DISCEX2001, 2001 https://doi.org/10.1109/DISCEX.2001.932176
- Patrick McDaniel, et. al., Antigone : A Flexible Framework for Secure Group Communication, Proceedings of the 8th USENLX Security Symposium, pp.99-114, 1999
- Gene H. Kim, et. al., The Design and Implementation of Tripwire : A File System Integrity Checker, Proceedings of the 2nd ACM Conference on CCS'94, pp.18-29, 1994 https://doi.org/10.1145/191177.191183
- Matthew Schimid, et. al., Preventing the Execution of Unauthorized Win32 Applications, Proceedings of DISCEK2001, 2001 https://doi.org/10.1109/DISCEX.2001.932170
- Terrance Mitchem, et. al., Linux Kernel Loadable Wrapper, Proceedings DISCEX2000, 2000 https://doi.org/10.1109/DISCEX.2000.821528
- Tim Hollebeek, et. al., Interception, Wrapping and Analysis Framework for Win32 Scripts, Proceedings of DISCEX2000, 2000 https://doi.org/10.1109/DISCEX.2001.932174
- Kenneth P. Birman, et. al., Spinglass : Secure and Scalable Communication Tools for Mission-Critical Computing, Proceedings of DISCEX2001, 2001 https://doi.org/10.1109/DISCEX.2001.932161
- Galen Hung, et. al., Detours : Binary Interception of Win32 Functions, Proceedings of the 3rd USENIX Windows NT Symposium, 1999
- Shaun Clowes, BlackHat Briefings 2001 in Amsterdam, Holland, http://www.securereality.com.au/archives.html
- Victoria Stavridou, et.al., Intrusion Tolerant Software Architectues, Proceedings of DISCEX2001, 2001
- Feiyi Wang, et. al., SITAR : A Scalable Intrusion-Tolerant Architecture for Distrubuted Services, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001 https://doi.org/10.1109/DISCEX.2003.1194957