1 |
DARPA OASIS project home page, http://www.darpa.mil/ipto/research/oasis/
|
2 |
박상서, 정보전 대응체계 구축 현황, WISC2000 튜토리얼 자료집, 2000
|
3 |
http://www.afrlsn.afrl.af.mil/LA&S_topics.htmll#ITS
|
4 |
http://www.darpa.mil/ipto/research/oasis/demval-goals.html
|
5 |
Gergory R. Ganger et. al., Survivable Storge Systems, Procceedings of DISCEX2001, 2001
|
6 |
Katerina Goseva-Popstojanova et. al., Characterizing Intrusion Tolerant Systems Using a State Transition Model, Proceedings of DISCEX2001, 2001
DOI
|
7 |
유찬수, 리눅스 클러스터링, 정보과학회지, 제18권 제2호, 2000
과학기술학회마을
|
8 |
Victoria Stavridou, et.al., Intrusion Tolerant Software Architectues, Proceedings of DISCEX2001, 2001
|
9 |
Feiyi Wang, et. al., SITAR : A Scalable Intrusion-Tolerant Architecture for Distrubuted Services, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, 2001
DOI
|
10 |
Galen Hung, et. al., Detours : Binary Interception of Win32 Functions, Proceedings of the 3rd USENIX Windows NT Symposium, 1999
|
11 |
Shaun Clowes, BlackHat Briefings 2001 in Amsterdam, Holland, http://www.securereality.com.au/archives.html
|
12 |
Gene H. Kim, et. al., The Design and Implementation of Tripwire : A File System Integrity Checker, Proceedings of the 2nd ACM Conference on CCS'94, pp.18-29, 1994
DOI
|
13 |
Matthew Schimid, et. al., Preventing the Execution of Unauthorized Win32 Applications, Proceedings of DISCEK2001, 2001
DOI
|
14 |
Terrance Mitchem, et. al., Linux Kernel Loadable Wrapper, Proceedings DISCEX2000, 2000
DOI
|
15 |
Tim Hollebeek, et. al., Interception, Wrapping and Analysis Framework for Win32 Scripts, Proceedings of DISCEX2000, 2000
DOI
|
16 |
Kenneth P. Birman, et. al., Spinglass : Secure and Scalable Communication Tools for Mission-Critical Computing, Proceedings of DISCEX2001, 2001
DOI
|
17 |
Partha P. Pal, et. al., Defense-Enabling Using Advanced Middleware: An Example, Proceedings of MILCOM2001, 2001
DOI
|
18 |
Gary McGraw et. al., Securing Java, Wiley, pp.38-48, 1999
|
19 |
Marcelo Tallis, et.al., 'Document Integrity through Mediated Interfaces,' Proceedings of DISCEX2001, 2001
|
20 |
Peng Liu, et. al., Intrusion Tolerant Database Systems, Technical Report, Dept.of Info.Systems, Univ.of Maryland, Baltimore County, 2001
|
21 |
Amjad Umar, et. al., Intrusion Tolerant Middleware, Proceedings of DISCEX2001, 2001
DOI
|
22 |
Patrick McDaniel, et. al., Antigone : A Flexible Framework for Secure Group Communication, Proceedings of the 8th USENLX Security Symposium, pp.99-114, 1999
|