A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
IEEE Transactions on Software Engineering
Survivability analysis of networked systems
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
Survivable Network System Analysis: A Case Study
IEEE Software
Survivability Analysis of Network Specifications
DSN '00 Proceedings of the 2000 International Conference on Dependable Systems and Networks (formerly FTCS-30 and DCCA-8)
Modeling and Quantification of Security Attributes of Software Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Architectures for Intrusion Tolerant Database Systems
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Self-Healing Workflow Systems under Attacks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
A method for modeling and quantifying the security attributes of intrusion tolerant systems
Performance Evaluation - Dependable systems and networks-performance and dependability symposium (DSN-PDS) 2002: Selected papers
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Survivability Analysis of Telephone Access Network
ISSRE '04 Proceedings of the 15th International Symposium on Software Reliability Engineering
Model-Based Validation of an Intrusion-Tolerant Information System
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
The design and implementation of a self-healing database system
Journal of Intelligent Information Systems - Special issue: Database and applications security
Intrusion-Tolerant Middleware: The Road to Automatic Security
IEEE Security and Privacy
Intrusion-tolerant architectures: concepts and design
Architecting dependable systems
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
A survivability model for cluster system
ICA3PP'05 Proceedings of the 6th international conference on Algorithms and Architectures for Parallel Processing
Survivability analysis of grid resource management system topology
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Transient time analysis of network security survivability using DEVS
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Modeling and evaluating the survivability of an intrusion tolerant database system
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Towards autonomic mode control of a scalable intrusion tolerant architecture
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Availability analysis of an IMS-based VoIP network system
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
An adaptive mode control algorithm of a scalable intrusion tolerant architecture
Journal of Computer and System Sciences
Hi-index | 0.00 |
In this paper we describe the stochastic behavior of an intrusion tolerant database (ITDB) system and quantitatively evaluate its security measures. More specifically, we develop a semi-Markov model and derive three security measures; system availability, system integrity and rewarding availability. By introducing an additional control parameter called the switching time, we develop secure control schemes of the ITDB, which maximize the respective security measures, and show numerically that the security measures can be improved by controlling the switching time.