1 |
Amjad Umar, et. al., 'Intrusion Tolerant Mid-dleware,' DARPA Information Survivability Conference & EXposition, 2001
DOI
|
2 |
Working Paper, 'The European Dependability Initiative,' Dec. 2000
|
3 |
DARPA의 Information survivability program(http://www.darpa.mil/ito)
|
4 |
V. Stavridou and B. Dutertre, 'From Security to Safety and Back,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998
DOI
|
5 |
V. Stavridou, 'Intrusion Tolerant Software Architectures,' DARPA Information Survivability Conference & EXposition, 200l
DOI
|
6 |
National Security Agency, Defence Advanced Research Projects Agency, Office of the Assistant Secretary of Defence, 'Securing the U.S Defence Information Infrastructures: A Proposed Approach,' 1998
|
7 |
Marc Wilikens, et. al., 'An Agenda for a Dependability Initiative,' Jan. 1998
|
8 |
Working Paper 'European Dependability Initiative: Inventory of EC Funded Projects in the area of Dependability,' Nov. 2000
|
9 |
John C. Knight, Matthew C. Elder, Xing Du, 'Error Recovery in Critical Infrastructure Systems,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998
DOI
|
10 |
C. Meadows, 'Security and Dependability: Then and Now,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998
DOI
|
11 |
Marc Wilikens, et. al., 'Defining the European Dependability Initiative,' May 1998
|
12 |
Brian Randell, 'Dependability - Unifying Concept,' Computer Security, Dependability & Assurance: From Needs to Solutions, 1998
DOI
|