• 검색어에 아래의 연산자를 사용하시면 더 정확한 검색결과를 얻을 수 있습니다.
  • 검색연산자
검색연산자 기능 검색시 예
() 우선순위가 가장 높은 연산자 예1) (나노 (기계 | machine))
공백 두 개의 검색어(식)을 모두 포함하고 있는 문서 검색 예1) (나노 기계)
예2) 나노 장영실
| 두 개의 검색어(식) 중 하나 이상 포함하고 있는 문서 검색 예1) (줄기세포 | 면역)
예2) 줄기세포 | 장영실
! NOT 이후에 있는 검색어가 포함된 문서는 제외 예1) (황금 !백금)
예2) !image
* 검색어의 *란에 0개 이상의 임의의 문자가 포함된 문서 검색 예) semi*
"" 따옴표 내의 구문과 완전히 일치하는 문서만 검색 예) "Transform and Quantization"
쳇봇 이모티콘
ScienceON 챗봇입니다.
궁금한 것은 저에게 물어봐주세요.

논문 상세정보

침입감내 소프트웨어 모델링을 위한 요구사항 추출 및 명세

Extraction and Specification of Requirements for Intrusion Tolerant Software Modeling


Current distributed systems are attacked from the outside as well as in which new intrusions are occurred. In particular there is a growing but largely unnoticed intrusion threat due to the emerging middleware technologies such as CORBA, WAP, XML support, and enterprise application integrators. In order to cope with these attacks, intrusion tolerance technology is introduced. Intrusion tolerance technology means that it can provide services normally although attacks are occurred into system. There are intrusion tolerance architectures such as ITUA, HACQIT, SITAR, and so on as a part of DARPA project. In this paper, we analyze and discuss existing intrusion tolerance architectures with respect to intrusion tolerance technology. Also, we extract intrusion tolerant requirements, which are required to develop ,intrusion tolerant system. We propose UML-IT(Intrusion Tolerance) profiles and specify intrusion tolerant software by applying UML-IT profiles.

저자의 다른 논문

참고문헌 (12)

  1. The Design andImplementation of an Intrusion Tolerant System , Reynolds,J.(et al.) , Proceedings of the International Conference on Dependable Systems and Networks (DSN'02) / v.,pp., 2002
  2. Intrusion-tolerant Enclaves , Dutertre,B.;Crettaz,V.;Stavridou,V. , Proceedings of the IEEE International Symposium on Security and Privacy / v.,pp., 2002
  3. Intrusion Tolerance in Distributed Systems , Deswarte,Y.(et al.) , IEEE Symp. on Research in Security and Privacy / v.,pp.110-121, 1991
  4. Design and Implementation of SITAR Architecture: A Status Report , Wang,F.;Killian,C. , Proc, of the ICDSN 2002 Supplementary / v.,pp.C-3-1, 2002
  5. Providing Intrusion Tolerance with ITUA , Courtney,T.(et al.) , Proc. of the ICDSN 2002 Supplementary / v.,pp.C-5-1, 2002
  6. Conceptual Model and Architecture of MAFTIA , Adelsbach,A.(et al.) , Project MAFTIA IST-1999-11583 deliverable D21 / v.,pp., 2002
  7. The Middleware architecture of MAFTIA: A Blueprint , Neves,N.F.;Verissimo,P. , DI/FCUL TR 99-6, Department of Computer Science, University of Lisboa / v.,pp., 2000
  8. SITAR: A Scalable Intrusion Tolerance Architecture for Distributed Server , Wang,F.;Gong,F.;Sargor,C.;Goseva-Popstojanova,K.;Trivedi,K.;Jou,F. , IEEE 2nd SMC Information Assurance Workshop / v.,pp., 2001
  9. Intrusion Telerance Approaches in ITUA , Cukier,M.(et al.) , Supplement of the 201 International Conference on Dependable Systems and Networks / v.,pp.64-65, 2001
  10. HACQIT (Hierarchical Adaptive Control of QoS for Intrustion Tolerance) , Just,J.E.;Reynolds,J.C. , 17th Annual Computer Security Applications Conference / v.,pp., 2001
  11. MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications) , Powell,D.(et al.) , Sup. of the 2001 International Conference on Dependable Systems and Networks (DSN2001) / v.,pp.D-32-D-35, 2001
  12. Developing a Heterogeneous Intrusion Tolerant CORBA System , Sames,D.(et al.) , Proceedings of the 2002 International Conference on Dependable Systems & Networks / v.,pp., 2002

이 논문을 인용한 문헌 (0)

  1. 이 논문을 인용한 문헌 없음


원문 PDF 다운로드

  • ScienceON :

원문 URL 링크

원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다. (원문복사서비스 안내 바로 가기)

상세조회 0건 원문조회 0건

DOI 인용 스타일