• O
  • OASIS
  • 2003
  • Foundations of Intrusion Tolerant Systems (OASIS'03)
Advanced Search 
Foundations of Intrusion Tolerant Systems (OASIS'03)
December 02-December 02
ISBN: 0-7695-2057-X
Table of Contents
Introduction
Preface (PDF)
pp. viii
Intrusion Tolerant Databases
Proof-Carrying Code
Certification Authorities
Intrusion Tolerant Storage
John D. Strunk, Carnegie Mellon University
Garth R. Goodson, Carnegie Mellon University
Michael L. Scheinholtz, Carnegie Mellon University
Craig A.N. Soules, Carnegie Mellon University
Gregory R. Ganger, Carnegie Mellon University
pp. 195
Linux Security
Chris Wright, WireX Communications, Inc.
Crispin Cowan, WireX Communications, Inc.
Stephen Smalley, Network Associates, Inc.
James Morris, Intercode Pty Ltd
Greg Kroah-Hartman, IBM Linux Technology Center
pp. 213
Crispin Cowan, Oregon Graduate Institute of Science & Technology
Perry Wagle, Oregon Graduate Institute of Science & Technology
Calton Pu, Oregon Graduate Institute of Science & Technology
Steve Beattie, Oregon Graduate Institute of Science & Technology
Jonathan Walpole, Oregon Graduate Institute of Science & Technology
pp. 227
Group Communications
HariGovind V. Ramasamy, University of Illinois at Urbana-Champaign
Prashant Pandey, IBM Almaden Research Center
James Lyons, University of Illinois at Urbana-Champaign
Michel Cukier, University of Maryland at College Park
William H. Sanders, University of Illinois at Urbana-Champaign
pp. 241
HariGovind V. Ramasamy, University of Illinois at Urbana-Champaign
Michel Cukier, University of Maryland at College Park
William H. Sanders, University of Illinois at Urbana-Champaign
pp. 251
Partha Pal, BBN Technologies LLC
Franklin Webber, BBN Technologies LLC
Richard Schantz, BBN Technologies LLC
pp. 261
System Reconfiguration
Chenxi Wang, University of Virginia
Jack Davidson, Microsoft Research
Jonathan Hill, University of Virginia
John Knight, University of Virginia
pp. 273
Antonio Carzaniga, University of Colorado at Boulder
David S. Rosenblum, University of California at Irvine
Alexander L. Wolf, University of Colorado at Boulder
pp. 283
Mobile-Code Security
Michael Franz, University of California at Irvine
Wolfram Amme, University of California at Irvine
Matthew Beers, University of California at Irvine
Niall Dalton, University of California at Irvine
Peter H. Fröhlich, University of California at Irvine
Vivek Haldar, University of California at Irvine
Andreas Hartmann, University of California at Irvine
Peter S. Housel, University of California at Irvine
Fermín Reig, University of California at Irvine
Jeffery von Ronne, University of California at Irvine
Christian H. Stork, University of California at Irvine
Sergiy Zhenochin, University of California at Irvine
pp. 337
Intrusion Tolerant Servers
James Reynolds, Teknowledge Corporation
James Just, Teknowledge Corporation
Ed Lawson, Teknowledge Corporation
Larry Clough, Teknowledge Corporation
Ryan Maglich, Teknowledge Corporation
Karl Levitt, University of California at Davis
pp. 368
James E. Just, Global InfoTek, Inc
James C. Reynolds, Teknowledge Corporation
Larry A. Clough, Teknowledge Corporation
Melissa Danforth, University of California at Davis
Karl N. Levitt, University of California at Davis
Ryan Maglich, Teknowledge Corporation
Jeff Rowe, University of California at Davis
pp. 374
David Sames, Network Associates, Inc
Brian Matt, Network Associates, Inc
Brian Niebuhr, Network Associates, Inc
Gregg Tally, Network Associates, Inc
Brent Whitmore, Network Associates, Inc
David Bakken, Washington State University
pp. 387
Wrappers
Timothy Fraser, Network Associates Labs
Lee Badger, Network Associates Labs
Mark Feldman, Network Associates Labs
pp. 399
Calvin Ko, Network Associates Labs
Timothy Fraser, Network Associates Labs
Lee Badger, Network Associates Labs
Douglas Kilpatrick, Network Associates Labs
pp. 414
Author Index
Usage of this product signifies your acceptance of the Terms of Use.