期刊文献+

面向服务的Web服务器容侵系统的研究与设计

下载PDF
导出
摘要 文章介绍了一种面向服务、具有容侵能力的Web服务器系统模型。Web服务器系统设计时运用了容侵思想,即使系统受到入侵,仍能继续为用户提供正常或降级的基本服务,以实现服务的最大化。
作者 郑媛媛
出处 《内蒙古科技与经济》 2010年第16期87-88,共2页 Inner Mongolia Science Technology & Economy
  • 相关文献

参考文献6

二级参考文献29

  • 1[1]Gemmell, P.S. An introduction to threshold cryptography. CryptoBytes, 1977,2(7):7~12.
  • 2[2]Wu, T., Malkin, M., Boneh, D. Building intrusion-tolerant applications. In: Proceedings of the USENIX Security Symposium. 1999. 79~91.
  • 3[3]Shoup, V. Practical threshold signatures. In: Proceedings of the Eurocrypt 2000. Bruges (Brugge): Springer-Verlag, 2000. 207~220.
  • 4[4]Frankel, Y., Gemmell, P., MacKenzie, P.D., et al. Optimal-Resilience proactive public-key cryptosystems. In: IEEE Symposium on Foundations of Computer Science. 1997. 384~393.
  • 5Du W, Mathur A P. Vulnerability testing of software system using fault injection: [Technical Report Coast TR-98-02].Department of Computer Science, Purdue University, 1998.
  • 6MCNC, D, University. Sitar : A scalable intrusion tolerant architecture for distributed services : [Technical report, Research Provosal to DARPA BAA-00-15]. 2000.
  • 7Lee-P A, Anderson T. Fault Tolerance: Principles and Practice.Springer Verlag, 1990.
  • 8Amoroso E G.Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back. Traps, and Response.Intrusion. Net Books, 1999.
  • 9Krsul I, SpaRord E H, Tripunitara M V. Computer vulnerability analysis: [Technical Report Coast TR 98-07]. Department of Computer Science, Purdue University, 1998.
  • 10Ellison R J, et al. Survivability : Protecting your critical systems.IEEE Internet Computing, 1999,3(6) : 55~63.

共引文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部