TIARA: Trust Management, Intrusion-tolerance, Accountability, and Reconstitution Architecture
The last 20 years have led to unprecedented improvements in chipdensity and system performance fueled mainly by Moore's Law. Duringthe same time, system and application software have bloated, leadingto unmanageable complexity, vulnerability to attack, rigidity and lackof robustness and account...
Main Authors: | Shrobe, Howard, Knight, Thomas, Hon, Andre de |
---|---|
Other Authors: | Howard Shrobe |
Published: |
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/37589 |
Similar Items
-
Research and implement on the intrusion tolerant system
by: YIN Li-hua, et al.
Published: (2006-01-01) -
Fuzzy trust model for wireless sensor networks with intrusion tolerance
by: WANG Liang-min1, et al.
Published: (2010-01-01) -
Representation for uncertainty trust of WSN based on lightweight-cloud
by: Xiao-bin XU, et al.
Published: (2014-02-01) -
Design and implementation of an intrusion-tolerant application server middleware
by: GUO Yuan-bo, et al.
Published: (2009-01-01) -
Packet-level intrusion detection /
by: Rami Hussen Mohammed Altilib, 1977-, et al.
Published: (2009)