|
[1] Quyen L. Nguyen and Arun Sood, “Comparative Analysis of Intrusion-Tolerant System Architectures," IEEE Security and Privacy. pp. 24-31, July-Aug. 2011. [2] D.F. McAllister, C.E. Sun and M.A. Vouk, "Reliability of Voting in Fault-Tolerant Software Systems for Small Output Spaces", IEEE Trans. Rel., Vol 39(5), pp 524-534, 1990. [3] James C. Reynolds , James E. Just , Ed Lawson , Larry A. Clough , Ryan Maglich , Karl N. Levitt, “The Design and Implementation of an Intrusion Tolerant System, “ Proceedings of the 2002 International Conference on Dependable Systems and Networks, p.285-292, June 23-26, 2002 [4] D. Arsenault, A. Sood, Y. Huang, “Secure, resilient computing clusters: self-cleansing intrusion tolerance with hardware enforced security (SCIT/HES)”, Second International Conference on Availability, Reliability and Security, Fairfax, Virginia, February 2007. [5] Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo. “Resilient Intrusion Tolerance through Proactive and Reactive Recovery. In Proceedings of the 13th IEEE Pacific Rim Dependable Computing Conference, pages 373--380. December 2007 [6] Yih Huang, David Arsenault, and Arun Sood, “Closing Cluster Attack Windows through Server Redundancy and Rotations” Proceedings of the Second International Workshop on Cluster Security (Cluster-Sec06),Singapore, May 2006 [7] Y. Huang, A. Ghosh, T. Bracewell and B. Mastropietro, A security evaluation of a novel resilient Web serving architecture: Lessons learned through industry/academia collaboration,” Proceedings of the International Conference on Dependable Systems and Networks Workshops, pp. 188–193, 2010. [8] Hans P. Reiser, Tobias Distler, Rüdiger,”Functional decomposition and interactions in hybrid intrusion-tolerant systems,” Proceedings of the 3rd International DiscCoTec Workshop on Middleware-Application Interaction, pp. 7-12,2009. [9] Yih Huang and Arun Sood, "Self-Cleansing Systems for Intrusion Containment", Proceedings of Workshop on Self-Healing, Adaptive, and Self-Managed Systems (SHAMAN), New York City, June 2002. [10] Amit Singh, “An Introduction To Virtualization,” http://research.ihost.com/osihpa/osihpa-hensbergen.pdf, February 5, 2004. [11] M. Rosenblum, and T. Garfinkel,“Virtual Machine Monitors: Current Technology and Future Trends,” Vol.38, No. 5, IEEE Computer, pp. 39-47, 2005 May. [12] R. P. Goldberg. “Architecture of virtual machines,” In proc. of the workshop on virtual computer systems, NY, USA, pages 74-112. ACM Press , New York, 1973. [13] VirtualBox, Sun Microsystems,Inc., http://www.virtualbox.org [14] Yih Huang, David Arsenault, and Arun Sood, “SCITDNS: Critical Infrastructure Protection through Secure DNS Server Dynamic Updates,” presented at the Trusted Internet Workshop Conference, Bangalore, India, December 2004. (Extended version to appear in Journal of High Speed Networking) [15] Arun Sood, “Minimizing Losses from Zero Days –A New Layer of Defense (SCIT),” Presented at the GFIRST 2010, San Antonio, TX, 2010. [16] Yih Huang, Arun Sood, and Ravi K. Bhaskar, “Countering Web Defacing Attacks with System Self-Cleansing,” Proceedings of 7th Word Multiconference on Systemics, Cybernetics and Informatics, pp. 12-16, Orlando, Florida, July 2003. [17] Anju Bala, Inderveer Chana., “Fault tolerance-Challenges, Techniques and Implementation in Cloud Computing” in International Journal of Computer Science Issues (IJCSI), pp238-246, Volume 9, Issue 1, January 2012. [18] http://haproxy.1wt.eu/download/1.3/doc/configuration.txt [19] Yih Huang, David Arsenault, and Arun Sood, "Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security" Journal of Networks, Academy Press, vol 1 No 5, pp 21 - 30, September/October 2006. [20] Yih Huang, David Arsenault, and Arun Sood, “Incorruptible System Self-Cleansing for Intrusion Tolerance", Proceedings Workshop on Information Assurance (WIA 2006), Phoenix, AZ, April 2006 [21] Q.Nguyen and A. Sood. “Quantitative Approach to Tuning of a Time-Based Intrusion-Tolerant System Architecture,”. 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems, Lisbon, Portugal, 2009. [22] Quyen L. Nguyen, Arun Sood, "Designing SCIT architecture pattern in a Cloud-based environment," Dependable Systems and Networks Workshops, pp.123-128, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, 2011 [23] Anantha K. Bangalore and Arun K Sood. “Securing Web Servers Using Self Cleansing Intrusion Tolerance (SCIT),” DEPEND 2009, Athens, Greece 2009. [24] Yih Huang, David Arsenault, and Arun Sood, “Securing DNS Services through System Self Cleansing and Hardware Enhancements,” Proceedings First International Conference on Availability, Reliability and Security ,Austria, April 2006.
|