Loyall, 2001 - Google Patents
An Open Implementation Toolkit for Creating Adaptable Distributed ApplicationsLoyall, 2001
View PDF- Document ID
- 3526321599493992099
- Author
- Loyall J
- Publication year
External Links
Snippet
The Open Implementation Toolkit for Creating Adaptable Distributed Applications project developed enabling technologies for building intrusion-aware, adaptable applications, ie, applications that can recognize intrusions, attacks, and malfunctions, and adapt to avoid …
- 230000003044 adaptive 0 abstract description 44
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/009—Trust
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fraser et al. | Hardening COTS software with generic software wrappers | |
Ghormley et al. | SLIC: An Extensibility System for Commodity Operating Systems. | |
Cho | A Framework for Alternate Queueing: Towards Traffic Management by PC-UNIX Based Routers. | |
Arlat et al. | Dependability of COTS microkernel-based systems | |
Yumerefendi et al. | TightLip: Keeping Applications from Spilling the Beans. | |
USRE43624E1 (en) | Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems | |
Hiltunen et al. | Survivability through customization and adaptability: The cactus approach | |
Locasto et al. | Software self-healing using collaborative application communities | |
Tripathi et al. | Exception handling in agent-oriented systems | |
Singh et al. | Integrating messaging middleware and information flow control | |
Landwehr et al. | A taxonomy of computer program security flaws, with examples | |
Herrmann et al. | Trust-adapted enforcement of security policies in distributed component-structured applications | |
Pal et al. | Open implementation toolkit for building survivable applications | |
Georg et al. | Designing high integrity systems using aspects | |
Loyall | An Open Implementation Toolkit for Creating Adaptable Distributed Applications | |
Bessayah et al. | A formal approach for specification and verification of fault injection process | |
Loyall et al. | Building Adaptive and Agile Applications Using Intrusion Detection and | |
Marwood | Extending Applications to the Network | |
Michael et al. | Forensic capabilities for service-oriented architectures | |
Wittner | Evaluation of Mobile Agent Systems with Respect to Failure Semantics | |
Necula | Enforcing Security and Safety with Proof-Carrying Code | |
Acharyay et al. | History-based Access Control for Mobile Code | |
Ambrosi et al. | Final Evaluation Report Verdix Corporation VSLAN 5.0. | |
Hilchie | A trusted path design and implementation for security enhanced linux | |
Kim et al. | FT_HORB: A fault-tolerant distributed programming environment based on RMI |