Dynamic Trust-Based Resource Allocation (Englisch)
- Neue Suche nach: Hughes, T.
- Neue Suche nach: Junod, M.
- Neue Suche nach: Muckelbauer, P.
- Neue Suche nach: Defense Advanced Research Projects Agency
- Neue Suche nach: IEEE
- Neue Suche nach: Hughes, T.
- Neue Suche nach: Junod, M.
- Neue Suche nach: Muckelbauer, P.
- Neue Suche nach: Defense Advanced Research Projects Agency
- Neue Suche nach: IEEE
In:
Information survivability conference and exposition; DARPA
;
90
;
2003
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Dynamic Trust-Based Resource Allocation
-
Beteiligte:Hughes, T. ( Autor:in ) / Junod, M. ( Autor:in ) / Muckelbauer, P. ( Autor:in ) / Defense Advanced Research Projects Agency / IEEE
-
Kongress:3rd, Information survivability conference and exposition; DARPA ; 2003 ; Washington, DC
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE Computer Society
-
Erscheinungsort:Los Alamitos, CA
-
Erscheinungsdatum:01.01.2003
-
Format / Umfang:90 pages
-
Anmerkungen:Also known as DISCEX 03
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 2
-
Cossack: coordinated suppression of simultaneous attacksPapadopoulos, C. / Lindell, R. / Mehringer, J. / Hussain, A. / Govindan, R. et al. | 2003
- 4
-
Open-source PKI on SELinux - a technology descriptionBubnis, E. / Evans, S. / Fischer, P. / Meighan, E. / Almeida, A. et al. | 2003
- 7
-
Demonstration of COSAK static analysis toolsDaCosta, D. / Dahn, C. / Mancoridis, S. / Prevelakis, V. et al. | 2003
- 10
-
MYSEA technology demonstrationIrvine, C. / Shifflett, D. / Clark, P. / Levin, T. / Dinolt, G. et al. | 2003
- 13
-
The TrustedBSD MAC FrameworkWatson, R. / Feldman, B. / Migus, A. / Vance, C. et al. | 2003
- 14
-
NetBouncer: client-legitimacy-based high-performance DDoS filteringThomas, R. / Mark, B. / Johnson, T. / Croall, J. et al. | 2003
- 18
-
Visualization as an aid for assessing the mission impact of information security breachesD'Amico, A. / Salas, S. et al. | 2003
- 21
-
A controller-based autonomic defense systemArmstrong, D. / Frazier, G. / Carter, S. / Frazier, T. et al. | 2003
- 24
-
Scyllarus intrusion detection report correlator and analyzerHeimerdinger, W. et al. | 2003
- 26
-
Analyzing interaction between distributed denial of service attacks and mitigation technologiesBlackert, W.J. / Gregg, D.M. / Castner, A.K. / Kyle, E.M. / Hom, R.L. / Jokerst, R.M. et al. | 2003
- 27
-
System health and intrusion monitoring: technology descriptionKo, C. et al. | 2003
- 30
-
CIRCADIA demonstration: active adaptive defenseMusliner, D. et al. | 2003
- 32
-
An integrated cyber panel systemTinnel, L.S. / Saydjari, O.S. / Haines, J.W. et al. | 2003
- 35 vol.2
-
Intelligence Preparation of the Information Battlespace (IPIB)Williams, J. et al. | 2003
- 38
-
Design and implementation of the Trusted BSD MAC frameworkWatson, R. / Feldman, B. / Migus, A. / Vance, C. et al. | 2003
- 38
-
Integrated security services for dynamic coalitionsKhurana, H. / Gavrila, S. / Bobba, R. / Koleva, R. / Sonalker, A. / Dinu, E. / Gligor, V. / Baras, J. et al. | 2003
- 41
-
Key management for secure multicast group communication in mobile networksKostas, T. / Kiwior, D. / Rajappan, G. / Dalal, M. et al. | 2003
- 44
-
Antigone: policy-based secure group communication system and AMirD: Antigone-based secure file mirroring systemIrrer, J. / Prakash, A. / McDaniel, P. et al. | 2003
- 47
-
Federated security management for dynamic coalitionsBhatt, S. / Raj Rajagopalan, S. / Rao, P. et al. | 2003
- 49
-
TrustBuilder: negotiating trust in dynamic coalitionsSeamons, K.E. / Chan, T. / Child, E. / Halcrow, M. / Hess, A. / Holt, J. / Jacobson, J. / Jarvis, R. / Patty, A. / Smith, B. et al. | 2003
- 50
-
Dynamic authorization and intrusion response in distributed systemsRyutov, T. / Neuman, C. / Kim, D. et al. | 2003
- 52
-
Yalta: a dynamic PKI and secure tuplespaces for distributed coalitionsSmith, T.J. / Byrd, G.T. et al. | 2003
- 55
-
A toolkit for building secure, fault-tolerant virtual private networksStephens, W. / Coan, B. / Narain, S. / Kaul, V. / Parmeswaran, K. / Cheng, T. et al. | 2003
- 58
-
Distributed data authenticationGoodrich, M.T. / Shin, M. / Straub, C.D. / Tamassia, R. et al. | 2003
- 60
-
Automated trust negotiation technology with attribute-based access controlWinsborough, W.H. / Jacobs, J. et al. | 2003
- 62
-
Design and analysis of an IP-Layer anonymizing infrastructureKung, H.T. / Chen-Mou Cheng, / Koan-Sin Tan, / Bradner, S. et al. | 2003
- 64
-
The Wackamole approach to fault tolerant networksAmir, Y. / Caudy, R. / Munjal, A. / Schlossnagle, T. / Tutu, C. et al. | 2003
- 66
-
Distributed denial of service defense attack tradeoff analysis (DDOS-DATA)Blackert, W.J. / Gregg, D.M. / Castner, A.K. / Hom, R.L. / Jokerst, R.M. / Kyle, E.M. et al. | 2003
- 68
-
NCAC: Network Congestion Analyzer and ControllerHyeong-Ah Choi, / Subramaniam, S. / Hongsik Choi, et al. | 2003
- 71
-
Defcon Capture the Flag: defending vulnerable code from intense attackCowan, C. et al. | 2003
- 73
-
DDoS tolerant networksFeinstein, L. / Schnackenberg, D. / Balupari, R. / Kindred, D. et al. | 2003
- 76
-
Guaranteed Internet Stack Utilization (GINSU) building blocksKnobbe, R. / Purtell, A. et al. | 2003
- 78
-
ANON: an IP-layer anonymizing infrastructureChen-Mou Cheng, / Kung, H.T. / Koan-Sin Tan, / Bradner, S. et al. | 2003
- 78
-
Towards a rigorous definition of information system survivabilityKnight, J.C. / Strunk, E.A. / Sullivan, K.J. et al. | 2003
- 81
-
Distributed embedded firewalls with virtual private groupsMarkham, T. / Meredith, L. / Payne, C. et al. | 2003
- 84
-
Fault-tolerant mesh of trust applied to DNS securityGriffin, W. / Mundy, R. / Weiler, S. / Massey, D. / Vora, N. et al. | 2003
- 87
-
Demonstration of fault tolerance for CORBA applicationsMoser, L. / Melliar-Smith, M. et al. | 2003
- 90 vol.2
-
Dynamic trust-based resource allocationHughes, T. / Junod, M. / Muckelbauer, P.A. et al. | 2003
- 90
-
Intrusion tolerance via network layer controlsO'Brien, D. / Smith, R. / Kappel, T. / Bitzer, C. et al. | 2003
- 91
-
Active Network Fault ResponseMurphy, S. / Hayatnagarkar, A. / Krishnaswainy, S. / Morrison, W. / Watson, R. et al. | 2003
- 97
-
Prophylactic, treatment and containment techniques for ensuring active network securityMurphy, S. / Hayatnagarkar, A. / Krishnaswamy, S. / Morrison, W. / Watson, R. et al. | 2003
- 97
-
Scalable DDoS Protection Using Route-Based FilteringPark, K. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 97 vol.2
-
Scalable DDoS protection using route-based filtering - DISCEX III demonstrationKihong Park, et al. | 2003
- 98
-
Techniques for intrusion-resistant ad hoc routing algorithms (TIARA)Ramanujan, R. / Kudige, S. / Nguyen, T. et al. | 2003
- 101
-
DefCOM: defensive cooperative overlay meshRobinson, M. / Mirkovic, J. / Michel, S. / Schnaider, M. / Reiher, P. et al. | 2003
- 103
-
Improving failure responsiveness in Jini leasingRose, S. / Bowers, K. / Quirolgico, S. / Mills, K. et al. | 2003
- 106
-
SPIE demonstration: single packet tracebackStrayer, W.T. / Jones, C.E. / Tchakountio, F. / Snoeren, A.C. et al. | 2003
- 108
-
Onion routing for resistance to traffic analysisSyverson, P. et al. | 2003
- 110
-
Lessons learned in using live red teams in IA experimentsLevin, D. et al. | 2003
- 112
-
TetherNet Anti-NAT-secure Internet subnet rental systemTouch, J.D. / Eggert, L. / Yu-Shun Wang, et al. | 2003
- 116
-
Safe Email, Safe Office, and Safe Web BrowserBalzer, R. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 116 vol.2
-
Safe email, safe office, and safe web browser demo descriptionBalzer, R. et al. | 2003
- 117
-
Access control on the Web using proof-carrying authorizationBauer, L. / Schneider, M.A. / Felten, E.W. / Appel, A.W. et al. | 2003
- 120
-
Enterprise wrappers for information assuranceFeldman, M. et al. | 2003
- 123
-
Willow system demonstrationKnight, J.C. / Hill, J. / Varner, P. / Wolf, A.L. / Heimbigner, D. / Devanbu, P. et al. | 2003
- 126
-
Camouflage of network traffic to resist attack (CONTRA)Weinstein, W. / Lepanto, J. et al. | 2003
- 128
-
Dependable Intrusion Tolerance: technology demoValdes, A. / Almgren, M. / Cheung, S. / Deswarte, Y. / Dutertre, B. / Levy, J. / Saidi, H. / Stavridou, V. / Uribe, T.E. et al. | 2003
- 130
-
Surveillance detection in high bandwidth environmentsRobertson, S. / Siegel, E.V. / Miller, M. / Stolfo, S.J. et al. | 2003
- 131
-
ITDB: an attack self-healing database system prototypePeng Liu, et al. | 2003
- 134
-
Intrustion Tolerant Web Servers via Network Layer ControlsO Brien, D. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 134 vol.2
-
Intrusion tolerant Web servers via network layer controlsO'Brien, D. et al. | 2003
- 135
-
Demonstrating intrusion tolerance with ITUAPal, P. et al. | 2003
- 138
-
VPNshield: protecting VPN services from denial-of-service (DoS) attacksRamanujan, R. / Kaddoura, M. / Wu, J. / Sanders, C. / Millikin, K. et al. | 2003
- 140
-
Detecting novel scans through pattern anomaly detectionValdes, A. et al. | 2003
- 140
-
On-line attack prevention and continual recoveryReynolds, J. et al. | 2003
- 143
-
An aspect-oriented security frameworkShah, V. / Hill, F. et al. | 2003
- 143
-
An Aspect-Oriented Security SolutionShah, V. / Hill, F. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 146 vol.2
-
OmniVPNShukla, J. et al. | 2003
- 147
-
Efficient code certification for open firmwareStillerman, M. / Kozen, D. et al. | 2003
- 149
-
Intrusion tolerant distributed object systems: project summaryTally, G. / Whitmore, B. / Sames, D. / Matt, B. / Niebuhr, B. / Bakken, D. et al. | 2003
- 149
-
Intrusion Tolerant Distributed Object SystemsTally, G. / Whitmore, B. / Sames, D. / Matt, B. / Niebuhr, B. / Bakken, D. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 152
-
Finding the vocabulary of program behavior data for anomaly detectionMichael, C.C. et al. | 2003
- 152 vol.2
-
SPMA - Java Binary Enhancement ToolVan Vleck, T. / Reisse, A. et al. | 2003
- 153
-
SITAR: a scalable intrusion-tolerant architecture for distributed services - a technology summaryFeiyi Wang, / Upppalli, R. et al. | 2003
- 153
-
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed ServicesWang, F. / Uppalli, R. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 158
-
System Detection's Hawkeye platformMiller, M. et al. | 2003
- 164
-
Detecting spoofed packetsTempleton, S.J. / Levitt, K.E. et al. | 2003
- 164
-
Modeling security-enhanced Linux policy specifications for analysisArcher, M. / Leonard, E. / Pradella, M. et al. | 2003
- 170
-
Open-source PKI on SELinuxBubnis, E. / Evans, S. / Fischer, P. / Meighan, E. / Almeida, A. et al. | 2003
- 176
-
Monterey security enhanced architecture projectIrvine, C. / Shifflett, D. / Clark, P. / Levin, T. / Dinolt, G. et al. | 2003
- 178
-
The STRONGMAN architectureKeromytis, A.D. / Ioannidis, S. / Greenwald, M.B. / Smith, J.M. et al. | 2003
- 182
-
Achieving principled assuredly trustworthy composable systems and networksNeumann, P.G. et al. | 2003
- 188 vol.2
-
Enhancing ReiserFS security in linuxReiser, H.T. et al. | 2003
- 189
-
Dynamic PKI and secure tuplespaces for distributed coalitionsSmith, T.J. / Byrd, G.T. / Xiaoyong Wu, / Hongjie Xin, / Thangavelu, K. / Wang, R. / Shah, A. et al. | 2003
- 196
-
LLSIM: network simulation for correlation and response testingHaines, J.W. / Goulet, S.A. / Durst, R.S. / Champion, T.G. et al. | 2003
- 201
-
RT: a Role-based Trust-management frameworkNinghui Li, / Mitchell, J.C. et al. | 2003
- 202
-
System health and intrusion monitoring (SHIM): project summaryKo, C. et al. | 2003
- 208
-
Predicting the impact of cyber-attacks on BMC/sup 3/ enterprisesShaw, J.J. et al. | 2003
- 208
-
Predicting the Impact of Cyber-Attacks on BMC^3EnterprisesShaw, J. / Defense Advanced Research Projects Agency / IEEE et al. | 2003
- 214
-
Understanding BGP behavior through a study of DoD prefixesXiaoliang Zhao, / Massey, D. / Wu, S.F. / Lad, M. / Pei, D. / Lan Wang, / Lixia Zhang, et al. | 2003
- 216
-
A framework for automated negotiation of access control policiesBharadwaj, V.G. / Baras, J.S. et al. | 2003
- 222
-
Recommendations in using group key management algorithmsWeifeng Chen, / Dondeti, L.R. et al. | 2003
- 226
-
Scaling secure group communication systems: beyond peer-to-peerAmir, Y. / Nita-Rotaru, C. / Stanton, J. / Tsudik, G. et al. | 2003
- 228
-
DyCER: a lightweight data sharing system using replicationKay, J. / Crocker, S. et al. | 2003
- 234
-
A flexible architecture for security policy enforcementMcDaniel, P. / Prakash, A. et al. | 2003
- 238
-
MuCAPSLMillen, J. / Denker, G. et al. | 2003
- 240
-
Trust Negotiation in Dynamic CoalitionsSeamons, K.E. / Winslett, M. / Ting Yu, / Chan, T. / Child, E. / Halcrow, M. / Hess, A. / Holt, J. / Jacobson, J. / Jarvis, R. et al. | 2003
- 246
-
Efficient and scalable infrastructure support for dynamic coalitionsGoodrich, M.T. / Tarnassia, R. et al. | 2003
- 252
-
Automated trust negotiation in attribute-based access controlWinsborough, W.H. / Jacobs, J. et al. | 2003
- 252
-
Efficient alarm management in optical networksStanic, S. / Subramaniam, S. / Hongsik Choi, / Sahin, G. / Hyeong-Ah Choi, et al. | 2003
- 260
-
A summary of the Autonomic Distributed Firewalls (ADF) projectMeredith, L.M. et al. | 2003
- 261
-
Leader election algorithms for wireless ad hoc networksVasudevan, S. / DeCleene, B. / Immerman, N. / Kurose, J. / Towsley, D. et al. | 2003
- 266
-
Traceback of single IP packets using SPIEStrayer, W.T. / Jones, C.E. / Tchakountio, F. / Snoeren, A.C. / Schwartz, B. / Clements, R.C. / Condell, M. / Partridge, C. et al. | 2003
- 271
-
DynaBone: dynamic defense using multi-layer Internet overlaysTouch, J.D. / Finn, G.G. / Yu-Shun Wang, / Eggert, L. et al. | 2003
- 273
-
Interactions between TCP and the IEEE 802.11 MAC protocolRui Jiang, / Gupta, V. / Ravishankar, C.V. et al. | 2003
- 277
-
A summary of detection of denial-of-QoS attacks on DiffServ networksXiaoyong Wu, / Mahadik, V.A. / Reeves, D.S. et al. | 2003
- 284
-
Engineering a distributed intrusion tolerant database system using COTS componentsPeng Liu, et al. | 2003
- 284
-
Modeling multistep cyber attacks for scenario recognitionCheung, S. / Lindqvist, U. / Fong, M.W. et al. | 2003
- 290
-
EMT/MET: systems for modeling and detecting errant emailStolfo, S.J. / Hershkop, S. / Ke Wang, / Nimeskern, O. et al. | 2003
- 293
-
Cooperative response strategies for large scale attack mitigationNojiri, D. / Rowe, J. / Levitt, K. et al. | 2003
- 297
-
Author index volume II| 2003
- 303
-
Statistical approaches to DDoS attack detection and responseFeinstein, L. / Schnackenberg, D. / Balupari, R. / Kindred, D. et al. | 2003
- 315
-
Author index volume I| 2003
- i
-
Proceedings DARPA Information Survivability Conference And Exposition| 2003