A Resource Reallocation Scheme Enhancing the Survivability of Essential Services |
Kim, Sung-Ki
(인천대학교 대학원 컴퓨터공학과)
Min, Byoung-Joon (인천대학교 컴퓨터공학과) Choi, Joong-Sup (한국정보보호진흥원) Kim, Hong-Geun (한국정보보호진흥원) |
1 | V. Stavridou, 'Intrusion Tolerant Software Architectures.' DARPA Information Survivability Conference & EXposition, 2001 DOI |
2 | Marc Wilikens, et, al., 'Defining the European Dependability Initiative,' May, 1998 |
3 | Working Paper, 'The European Dependability Initiative,' Dec., 2000 |
4 | National Security Agency, Defence Advanced Research Projects Agency, Office of the Assistant Secretary of Defence, 'Securing the U.S. Defence Information Infrastructures : A Proposed Approach,' 1998 |
5 | DARPA Information survivability program, http://www.darpa.mil/ito |
6 | MicroSoft, 'Programming Server-Side Applications for Windows 2000,' MicroSoft Programming Series, 2000 |
7 | SNAS Institute Resources,The Twenty Most Critical Internet Security Vulnerabilities,' http://www.sans.org/top20.htm |
8 | Matti A. Hiltunen, et al., 'Survivability through Customization and Adaptability : The Cactus Approach,' DARPA Information Survivability Conference & EXposition, 2000 DOI |
9 | Brian Randell, 'Dependability & Assurance : From Needs to Solutions,Dependability - Unifying Concept,' Computer Security, Dependability & Assurance : From Needs to Solutions, 1998 DOI |