1 |
Providing Intrusion Tolerance with ITUA
/
[
T. Courtney(et. al.)
] /
Proc. of the ICDSN 2002 Supplementary Vol.
|
2 |
Dependability -A Unifying Concept
/
[
B. Randell
] /
Computer Security, Dependability, and Assurance: From Needs to Solutions
|
3 |
Design and Implementation of SITAR Architecture: A Status Report
/
[
F. Wang;C. Killian
] /
Proc, of the ICDSN 2002 Supplementary Vol.
|
4 |
The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications
/
[
J. Knight(et al.)
] /
Proc. of the ICDSN 2002 Supplementary Vol.
|
5 |
The Timely Computing Base: Timely Actions in the Presence of Uncertain Timeliness
/
[
Paulo Verissimo(et al.)
] /
Proc. of the ICDSN 2000
|
6 |
/
[
J.C. Laprie.
] /
Dependablity:Basic Concepts and Terminology
|
7 |
Intrusion Tolerance through Forensics-Based Attack Learning
/
[
J. Just(et al.)
] /
Proc. of the ICDSN 2002 Supplementary Vol.
|
8 |
Intrusion-Tolerance using Fine-Grain Fragmentation-Scattering
/
[
Fray, J.-M;Deswarte, Y.;Powell, D.
] /
Symp. on Security and Privacy
|