Architectures for intrusion tolerant database systems
P Liu - 18th Annual Computer Security Applications …, 2002 - ieeexplore.ieee.org
In this paper we propose four architectures for intrusion-tolerant database systems. While
traditional secure database systems rely on prevention controls, an intrusion-tolerant …
traditional secure database systems rely on prevention controls, an intrusion-tolerant …
[PS][PS] Intrusion response systems: a survey
B Foo, MW Glause, GM Howard, YS Wu… - … and security in …, 2008 - cerias.purdue.edu
Protecting networks from computer security attacks is an important concern of computer
security. Within this, intrusion prevention and intrusion detection systems have been the …
security. Within this, intrusion prevention and intrusion detection systems have been the …
Security analysis of SITAR intrusion tolerance system
D Wang, BB Madan, KS Trivedi - … of the 2003 ACM workshop on …, 2003 - dl.acm.org
Security is an important QoS attribute for characterizing intrusion tolerant computing
systems. Frequently however, the security of computing systems is assessed in a qualitative …
systems. Frequently however, the security of computing systems is assessed in a qualitative …
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that
create an avenue for propagation of a failure from one service to another. The failures being …
create an avenue for propagation of a failure from one service to another. The failures being …
Improving the security of microservice systems by detecting and tolerating intrusions
J Flora - 2020 IEEE International Symposium on Software …, 2020 - ieeexplore.ieee.org
Microservice architectures adoption is growing expeditiously in market size and adoption,
including in business-critical systems. This is due to agility in development and deployment …
including in business-critical systems. This is due to agility in development and deployment …
The design and implementation of a self-healing database system
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-
tolerant database prototype system. While traditional secure database systems rely on …
tolerant database prototype system. While traditional secure database systems rely on …
[LIBRO][B] Information assurance: dependability and security in networked systems
In today's fast paced, infocentric environment, professionals increasingly rely on networked
information technology to do business. Unfortunately, with the advent of such technology …
information technology to do business. Unfortunately, with the advent of such technology …
Intrusion tolerant approach for denial of service attacks to web services
M Ficco, M Rak - 2011 First International Conference on Data …, 2011 - ieeexplore.ieee.org
Intrusion Detection Systems are the major technology used for protecting information
systems. However, they do not directly detect intrusion, but they only monitor the attack …
systems. However, they do not directly detect intrusion, but they only monitor the attack …
[LIBRO][B] Network security: know it all
J Joshi - 2008 - books.google.com
Network Security: Know It All explains the basics, describes the protocols, and discusses
advanced topics, by the best and brightest experts in the field of network security …
advanced topics, by the best and brightest experts in the field of network security …
Modeling and evaluating the survivability of an intrusion tolerant database system
The immaturity of current intrusion detection techniques limits the traditional security systems
in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome …
in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome …