Since security is increasingly the principal concern in the conception and implementation of software systems, it is very important that the security mechanisms are designed so as to protect the computer systems against cyber attacks. An Intrusion Tolerance Systems play a crucial role in maintaining the service continuity and enhancing the security compared with the traditional security. In this paper, we propose to combine a preventive maintenance with existing intrusion tolerance system to improve the system security. We use a semi-Markov process to model the system behavior. We quantitatively analyze the system security using the measures such as system availability, Mean Time To Security Failure and cost. The numerical analysis is prese...
Large amount of (security) faults existing in software systems could be complex and hard to identify...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Many institutions rely on open systems to provide services to the public via the Internet. Unanticip...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Abstract—In Service-Oriented Architecture, a service contains a set of operations with openly define...
It is inevitable for networks to be invaded during operation. The intrusion tolerance technology com...
Abstract Despite the increased focus on security, critical information systems remain vulnerable t...
Abstract—In this paper we quantitatively evaluate depend-ability/security of a computer-based system...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Abstract — The number of malware attacks is increasing, Companies have invested millions of dollars ...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Abstract. The introduction of self-healing capabilities to software systems could offer a way to alt...
As two different research topics with much overlap, dependability and security of computer/communica...
Increasingly, cyber attacks against enterprises and governments make use of automated tools. For thi...
Large amount of (security) faults existing in software systems could be complex and hard to identify...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
This paper is based on a conceptual framework in which security can be split into two generic types ...
Many institutions rely on open systems to provide services to the public via the Internet. Unanticip...
Quite often failures in network based services and server systems may not be accidental, but rather ...
Abstract—In Service-Oriented Architecture, a service contains a set of operations with openly define...
It is inevitable for networks to be invaded during operation. The intrusion tolerance technology com...
Abstract Despite the increased focus on security, critical information systems remain vulnerable t...
Abstract—In this paper we quantitatively evaluate depend-ability/security of a computer-based system...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Abstract — The number of malware attacks is increasing, Companies have invested millions of dollars ...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Abstract. The introduction of self-healing capabilities to software systems could offer a way to alt...
As two different research topics with much overlap, dependability and security of computer/communica...
Increasingly, cyber attacks against enterprises and governments make use of automated tools. For thi...
Large amount of (security) faults existing in software systems could be complex and hard to identify...
This paper suggests a quantitative approach to security, and specifically to a security-concept, whi...
This paper is based on a conceptual framework in which security can be split into two generic types ...