A graph transform model for configuration management environments
SDE 3 Proceedings of the third ACM SIGSOFT/SIGPLAN software engineering symposium on Practical software development environments
A generic, peer-to-peer repository for distributed configuration management
Proceedings of the 18th international conference on Software engineering
A cooperative approach to support software deployment using the software dock
Proceedings of the 21st international conference on Software engineering
Configurable software architecture in support of configuration management and software deployment
Proceedings of the 21st international conference on Software engineering
A Testbed for Configuration Management Policy Programming
IEEE Transactions on Software Engineering
Towards large-scale information integration
Proceedings of the 24th International Conference on Software Engineering
System Health and Intrusion Monitoring Using a Hierarchy of Constraints
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Reconfiguration in the Enterprise JavaBean Component Model
CD '02 Proceedings of the IFIP/ACM Working Conference on Component Deployment
Evaluating Software Deployment Languages and Schema
ICSM '98 Proceedings of the International Conference on Software Maintenance
Hi-index | 0.00 |
Securing software systems against malicious attack, corruption, and subversion has been an ongoing research problem. Novel applications of software configuration technology may provide solutions to these problems. Three interesting problems and potentials solutions are presented. The problems are intrusion tolerance, misuse protection, and cyber-forensics. The first two can be addressed using dynamic reconfiguration to modify the behavior of a software system. The last problem can be addressed using configuration information as a comprehensive framework on which to hang a variety of other information necessary for forensic analysis.