|
[1] D.A. Grier, “The Innovation Curve,” IEEE Computer Society, Vol. 39, pp. 8-10, February 2006. [2] A. Azadmanesh, A.W. Krings, and P.W. Oman, “Security and Survivability of Networked Systems,” Proceedings of the 38th IEEE Hawaii International Conference on System Sciences, 2005. [3] R. Richardson, “2008 CSI Computer Crime and Security Survey,” Computer Security Institute, 2008, http://www.gocsi.com/. [4] M. Al-Kuwaiti, N. Kyriakopoulos, and S. Hussein, “Network Dependability, Fault-tolerance, Reliability, Security, Survivability: A Framework for Comparative Analysis,” The George Washington University, November 2006. [5] G.R. Ganger, H. Kılıççöte, J.D. Strunk, J.J. Wylie, M.W. Bigrigg, and P.K. Khosla, “Survivable Information Storage Systems,” Garnegie Mellon University, August 2000. [6] “Information Security in Taiwan,” http://www.informationsecurity.com.tw. [7] G. Levitin, “Optimal Defense Strategy against Intentional Attacks,” IEEE Transactions on Reliability, Vol. 56, No. 1, March 2007. [8] A. Shamir, “How to Share a Secret,” Massachusetts Institute of Technology, 1979. [9] M. Tompa, “How to Share a Secret with Cheaters,” International Association for Cryptologic Research, 1988. [10] A. Herzberg, H. Krawczyk, M. Yung, and S. Jarecki, “Proactive Secret Sharing or How to Cope with Perpetual Leakage,” IBM T.J. Watson Research Center, 1995. [11] A. Subbiah and D.M. Blough, “An Approach for Fault Tolerant and Secure Data Storage in Collaborative Work Environments,” School of Electrical and Computer Engineering Georgia Institute of Technology, April 2005. [12] B. Wang and J.C. Hou, “Multicast Routing and Its QoS Extension: Problems, Algorithms, and Protocols,” The Ohio State University. [13] J. Crowcroft and Z. Wang, “Quality of Service Routing for Supporting Multimedia Applications,” IEEE Journal on Selected Areas in Communications, September 1996. [14] K. Nahrstedt and S. Chen, “An Overview of Quality-of-Service Routing for the Next Generation High-Speed Network: Problems and Solutions,” IEEE Network, December 1998. [15] G. Karlsson and I. Mas, “Quality of Service and the End to End Argument,” IEEE Network, November 1997. [16] D.A. Fisher and H.F. Lipson, “Survivability - A New Technical and Business Perspective on Security,” Coordination Center Software Engineering Institute, 2000. [17] D.A. Fisher, H.F. Lipson, N.R. Mead, R.C. Linger, R.J. Ellison, and T.A. Longstaff, “Survivable Network Systems: An Emerging Discipline,” Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, pp. 1-31, November 1997 (Revised 1999). [18] A. Krings, “Design for Survivability: A Tradeoff Space,” ACM International Conference Proceeding Series, Vol. 288, 2008. [19] J.L. Tzeng, “Near Optimal Network Defense Resource Allocation Strategies for the Minimization of Information Leakage,” Department of Information Management, National Taiwan University, 2006. [20] M.N. Azaiez and V.M. Bier, “Optimal Resource Allocation for Security in Reliability Systems,” European Journal of Operational Research, Vol. 181, No. 2, pp. 773-786, September 2007. [21] A.M. Geoffrion, “Lagrangean Relaxation and Its Use in Integer Programming,” Mathematical Programming Study, Vol. 2, pp. 82-114, 1974. [22] M.L. Fisher, “The Lagrangian Relaxation Method for Solving Integer Programming Problems,” Management Science, Vol. 27, No. 1, pp. 1-18, January 1981. [23] M.L. Fisher, “An Application Oriented Guide to Lagrangean Relaxation,” Interfaces, Vol. 15, No. 2, pp. 10-21, April 1985. [24] C.D. Gelatt, M.P. Vecchi, and S. Kirkpatrick, “Optimization by Simulated Annealing,” Science, Vol. 220, No. 4598, pp. 671-680, May 1983.
|