[1] 张云英, 努尔布力, 王程明, 姜千, 胡亮, ZHANG Yun-ying, NURBOL, WANG Cheng-ming, JIANG Qian, HU Liang. 入侵容忍综述 [J]. 吉林大学学报(信息科学版) 2009.doi:10.3969/j.issn.1671-5896.2009.04.010 [2] Saidane, Ayda, Nicomette, Vincent, Deswarte, Yves. The Design of a Generic Intrusion-Tolerant Architecture for Web Servers [J]. IEEE transactions on dependable and secure computing 2009, 1(1). [3] VER(I)SSIMO P, NEVES N, CORREIA M. Intrusion-tolerant architectures:concepts and design [J]. Lecture Notes in Computer Science 2003. [4] ALYSSON N, PAULO S, MIGUE C. Cheap intrusion-tolerant protection for CRUTIAL things [R]. Lisbon:Department of Computer Science, University of Lisbon 2009. [5] RAFAEL F, BRUNO G, JOAO S. An intrusion-tolerant web server based on the DISTRACT architecture [EB/OL]. http://www.di.fc, ul.pt/~nuno/PAPERS/WDDDMO4 2011. [6] VERISSIMO P, NEVES N, CORREIA M. Intrusion-tolerant architectures:concepts and design architecting dependable systems [J]. Lecture Notes in Computer Science 2003. [7] Verissimo P.E., Neves N.F., Cachin C., Poritz J., Powell D., Deswarte Y., Stroud R., Welch I.. Intrusion-tolerant middleware: the road to automatic security [J]. IEEE security & privacy 2006, 4(4). [8] BANGALORE A, SOOD A. Securing web servers using self cleansingintrusion tolerance (SCIT) [EB/OL]. http://cs.gmu.edu/~asood/scit/depend_2009_submitted_version-2 2010. [9] NGUYEN Q, SOOD A. Comparative analysis of intrusion-tolerant system architectures [EB/OL]. http://cs.gmu.edu/~asood/scit/SP-PrePrint 2011. [10] Sousa, P., Bessani, A.N., Correia, M., Neves, N.F., Verissimo, P.. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery [J]. IEEE Transactions on Parallel and Distributed Systems: A Publication of the IEEE Computer Society 2010, 4(4). |