Security Protocols
暂无分享,去创建一个
J. van Leeuwen | Bruce Christianson | Jan van Leeuwen | Michael Roe | Bruno Crispo | James A. Malcolm
[1] Ian T. Foster,et al. The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..
[2] Z. Ruttkay. Fuzzy constraint satisfaction , 1994, Proceedings of 1994 IEEE 3rd International Fuzzy Systems Conference.
[3] Andy J. Wellings,et al. GUARDS: A Generic Upgradable Architecture for Real-Time Dependable Systems , 1997, IEEE Trans. Parallel Distributed Syst..
[4] Feiyi Wang,et al. SITAR: a scalable intrusion-tolerant architecture for distributed services , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[5] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[6] Thomas Schiex,et al. Possibilistic Constraint Satisfaction Problems or "How to Handle Soft Constraints?" , 1992, UAI.
[7] Craig A. N. Soules,et al. Survivable storage systems , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[8] D. Dubois,et al. The calculus of fuzzy restrictions as a basis for flexible constraint satisfaction , 1993, [Proceedings 1993] Second IEEE International Conference on Fuzzy Systems.
[9] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[10] Giovanni Vigna,et al. The STAT tool suite , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[11] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[12] D. Powell,et al. The Delta-4 Approach to Dependability in Open Distributed Computing Systems , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..
[13] Marek J. Sergot,et al. Revocation schemes for delegated authorities , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[14] Steven Tuecke,et al. The Physiology of the Grid An Open Grid Services Architecture for Distributed Systems Integration , 2002 .
[15] Eugene C. Freuder,et al. Partial Constraint Satisfaction , 1989, IJCAI.
[16] Ugo Montanari,et al. Networks of constraints: Fundamental properties and applications to picture processing , 1974, Inf. Sci..
[17] Alfonso Valdes,et al. Live Traffic Analysis of TCP/IP Gateways , 1998, NDSS.
[18] Alan K. Mackworth. Consistency in Networks of Relations , 1977, Artif. Intell..
[19] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[20] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[21] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[22] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[23] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[24] Marek J. Sergot,et al. Using Authority Certificates to Create Management Structures , 2001, Security Protocols Workshop.
[25] Gavin Lowe,et al. An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..
[26] John C. Mitchell,et al. Undecidability of bounded security protocols , 1999 .
[27] Paulo Veríssimo,et al. xAMp: a multi-primitive group communications service , 1992, [1992] Proceedings 11th Symposium on Reliable Distributed Systems.