Resource Reallocation for the Protection of Essential Services |
민병준
(인천대학교 컴퓨터공학과)
김성기 (인천대학교 컴퓨터공학과) 최중섭 (한국정보보호진흥원) 김홍근 (한국정보보호진흥원) |
1 | Amjad Umar, et. al., 'Intrusion Tolerant Mid-dleware,' DARPA Information Survivability Conference & EXposition, 2001 DOI |
2 | Working Paper, 'The European Dependability Initiative,' Dec. 2000 |
3 | DARPA의 Information survivability program(http://www.darpa.mil/ito) |
4 | V. Stavridou and B. Dutertre, 'From Security to Safety and Back,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998 DOI |
5 | V. Stavridou, 'Intrusion Tolerant Software Architectures,' DARPA Information Survivability Conference & EXposition, 200l DOI |
6 | National Security Agency, Defence Advanced Research Projects Agency, Office of the Assistant Secretary of Defence, 'Securing the U.S Defence Information Infrastructures: A Proposed Approach,' 1998 |
7 | Marc Wilikens, et. al., 'An Agenda for a Dependability Initiative,' Jan. 1998 |
8 | Working Paper 'European Dependability Initiative: Inventory of EC Funded Projects in the area of Dependability,' Nov. 2000 |
9 | John C. Knight, Matthew C. Elder, Xing Du, 'Error Recovery in Critical Infrastructure Systems,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998 DOI |
10 | C. Meadows, 'Security and Dependability: Then and Now,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998 DOI |
11 | Marc Wilikens, et. al., 'Defining the European Dependability Initiative,' May 1998 |
12 | Brian Randell, 'Dependability - Unifying Concept,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998 DOI |