Denial of Service: A Perspective

作者: Jonathan K Millen , None

DOI: 10.1007/978-3-7091-9396-9_10

关键词:

摘要: The scope of “denial-of-service protection” can be limited by comparing it and contrasting with related concepts. objectives general concepts that drive current research have already been clarified to some extent prior work. We summarize the conclusions emerged, assess their implications for development denial-of-service protection requirements guidance future research.

参考文章(16)
N.G. Leveson, Verification of Safety IFAC Proceedings Volumes. ,vol. 16, pp. 167- 174 ,(1983) , 10.1016/S1474-6670(17)61779-8
Ali Mili, Introduction to Program Fault Tolerance Prentice Hall PTR. ,(1990)
J. T. Haigh, R. C. O'Brien, W. T. Wood, T. G. Fine, M. J. Endrizzi, S. Yalamanchili, Assured Service Concepts and Models. Volume 1. Summary Defense Technical Information Center. ,(1992) , 10.21236/ADA253204
S. Yalamanchili, T. G. Fine, R. C. O'Brien, J. T. Haigh, M. J. Endrizzi, W. T. Wood, Assured Service Concepts and Models. Volume 3. Availability in Distributed MLS Systems ,(1992)
Virgil D. Gligor, A Note on the Denial-of-Service Problem. ieee symposium on security and privacy. pp. 139- 149 ,(1983)
Terry Mayfield, J. E. Roskos, Stephen R. Welke, John M. Boone, Catherine W. McDonald, Integrity in Automated Information Systems Defense Technical Information Center. ,(1991) , 10.21236/ADA245555
John E. Dobson, Information and Denial of Service Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects. pp. 21- 46 ,(1991)
Bev Littlewood, How to Measure Software Reliability and How Not To IEEE Transactions on Reliability. ,vol. R-28, pp. 103- 110 ,(1979) , 10.1109/TR.1979.5220510
Ravi S. Sandhu, Expressive Power of the Schematic Protection Model Journal of Computer Security. ,vol. 1, pp. 59- 98 ,(1992) , 10.3233/JCS-1992-1104
J.K. Millen, A resource allocation model for denial of service ieee symposium on security and privacy. pp. 137- 147 ,(1992) , 10.1109/RISP.1992.213265