Replication does survive information warfare attacks

作者: J. Mcdermott

DOI: 10.1007/978-0-387-35285-5_13

关键词: JammingComputer virusInformation warfareComputer securityTrojan horseEngineeringReplication (computing)

摘要: Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show special cases of are only detecting but also recovering from

参考文章(6)
J. McDermott, J. Froscher, Practical Defenses Against Storage Jamming Defense Technical Information Center. ,(1997) , 10.21236/ADA465493
Ravi S. Sandhu, Separation of Duties in Computerized Information Systems. DBSec. pp. 179- 190 ,(1990)
P. Ammann, S. Jajodia, C.D. McCollum, B.T. Blaustein, Surviving information warfare attacks on databases ieee symposium on security and privacy. pp. 164- 174 ,(1997) , 10.1109/SECPRI.1997.601331
J. McDermott, D. Goldschlag, Towards a model of storage jamming Proceedings 9th IEEE Computer Security Foundations Workshop. pp. 176- 185 ,(1996) , 10.1109/CSFW.1996.503703
D. Goldschlag, J. McDermott, Storage jamming Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects. pp. 365- 381 ,(1996)