Foreword |
|
ix | |
Acknowledgments |
|
x | |
Introduction |
|
xi | |
|
|
Architecting Information Infrastructures for Security |
|
|
1 | (190) |
|
|
Architectures for Secure and Robust Distributed Infrastructures |
|
|
|
Overview of the ASRDI (Architectures for Secure and Robust Distributed Infrastructures) Project |
|
|
3 | (32) |
|
|
|
|
|
|
|
|
|
|
|
Approximate Fairness through Differential Dropping |
|
|
35 | (18) |
|
|
|
|
|
A Complex Adaptive System Approach to QoS Assurance and Stateful Resource Management for Dependable Information Infrastructure |
|
|
|
Quality of Service Assurance for Dependable Information Infrastructures |
|
|
53 | (27) |
|
|
|
|
Onset of Traffic Congestion in Complex Networks |
|
|
80 | (8) |
|
|
|
|
|
Anomaly and Misuse Detection in Network Traffic Streams---Checking and Machine Learning Approaches |
|
|
|
Anomaly and Misuse Detection in Network Traffic Streams---Checking and Machine Learning Approaches |
|
|
88 | (12) |
|
|
|
|
|
|
|
An Ensemble of Anomaly Classifiers for Identifying Cyber Attacks |
|
|
100 | (8) |
|
|
|
|
|
Distributed Systems Security via Logical Frameworks |
|
|
|
Distributed System Security via Logical Frameworks |
|
|
108 | (8) |
|
|
|
|
Device-Enabled Authorization in the Grey System |
|
|
116 | (15) |
|
|
|
|
|
|
|
Distributed Immune Systems for Wireless Networks Information Assurance |
|
|
|
Distributed Immune Systems for Wireless Networks Information Assurance |
|
|
131 | (28) |
|
|
A Key Management Scheme for Distributed Sensor Networks |
|
|
159 | (9) |
|
|
|
Hi-DRA High-Speed, Wide-Area Network Detection, Response, and Analysis |
|
|
|
Summary of the Hi-DRA Project A System for High-Speed, Wide-Area Network Detection, Response, and Analysis |
|
|
168 | (13) |
|
|
|
|
|
Stateful Intrusion Detection for High-Speed Networks |
|
|
181 | (10) |
|
|
|
|
|
At the Edges of the Critical Information Infrastructure |
|
|
191 | (156) |
|
|
|
Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security |
|
|
|
Better Security via Smarter Devices |
|
|
193 | (6) |
|
|
|
|
Storage-Based Intrusion Detection: Watching Storage Activity for Suspicious Behavior |
|
|
199 | (13) |
|
|
|
|
|
|
|
Software Model Checking for Embedded Systems |
|
|
|
Customizable Model Checking for Embedded Software |
|
|
212 | (16) |
|
|
|
|
|
|
Exploiting Object Escape and Locking Information in Partial-Order Reductions for Concurrent Object-Oriented Programs |
|
|
228 | (42) |
|
|
|
|
Venkatesh Prasad Ranganath |
|
|
Advanced Tool Integration for Embedded System Assurance |
|
|
|
Overview of the HASTEN (High Assurance Systems Tools and Environments) Project |
|
|
270 | (27) |
|
|
|
|
|
|
|
|
|
Hierarchical Modeling and Analysis of Embedded Systems |
|
|
297 | (18) |
|
|
|
|
|
|
|
|
|
|
|
Verification Tools for Embedded Systems |
|
|
|
Formal Verification for High Confidence Embedded Systems |
|
|
315 | (21) |
|
|
|
|
|
|
Bridging the Gap between Systems Design and Space Systems Software |
|
|
336 | (11) |
|
|
|
|
|
|
Software Engineering for Assurance |
|
|
347 | (128) |
|
|
|
Static Analysis to Enhance the Power of Model Checking for Concurrent Software |
|
|
|
Static Analysis to Enhance the Power of Model Checking for Concurrent Software |
|
|
349 | (12) |
|
|
|
|
Abstraction Refinement via Inductive Learning |
|
|
361 | (14) |
|
|
|
|
Protecting COTS from the Inside |
|
|
|
Analysis of COTS for Security Vulnerability Remediation |
|
|
375 | (6) |
|
|
|
|
|
|
|
|
|
|
Formalizing Sensitivity in Static Analysis for Intrusion Detection |
|
|
381 | (15) |
|
|
|
|
|
|
|
RAPIDware: Component-Based Development of Adaptive and Dependable Middleware |
|
|
|
RAPIDware: Component-Based Development of Adaptive and Dependable Middleware |
|
|
396 | (11) |
|
|
|
|
|
|
Composing Adaptive Software |
|
|
407 | (9) |
|
|
|
|
|
Generating Efficient Trust Management Software from Policies |
|
|
|
Generating Efficient Security Software from Policies |
|
|
416 | (9) |
|
|
|
Role-Based Access Control: A Corrected and Simplified Specification |
|
|
425 | (15) |
|
|
|
Modeling and Simulation Environment for Critical Information Protection |
|
|
|
Analysis, Modeling, and Simulation for Networked Systems |
|
|
440 | (26) |
|
|
|
|
|
|
|
|
|
|
Protection of Simple Series and Parallel Systems with Components of Different Values |
|
|
466 | (9) |
|
|
|
|
|
475 | (82) |
|
|
|
Language-Based Security for Malicious Mobile Code |
|
|
|
Language-Based Security for Malicious Mobile Code |
|
|
477 | (18) |
|
|
|
|
|
Malicious Code Detection for Open Firmware |
|
|
495 | (10) |
|
|
|
|
Model-Carrying Code: A New Approach to Mobile-Code Security |
|
|
|
Safe Execution of Mobile and Untrusted Code: The Model-Carrying Code Project |
|
|
505 | (14) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications |
|
|
519 | (14) |
|
|
|
|
|
|
Neutralizing Malicious Mobile Code |
|
|
|
Behavioral Detection of Malicious Code |
|
|
533 | (12) |
|
|
|
|
|
|
|
Gatekeeper II: New Approaches to Generic Virus Prevention |
|
|
545 | (12) |
|
|
|
|
Dependable Critical Information Infrastructure for Command and Control |
|
|
557 | (118) |
|
|
|
Trustworthy Infrastructure, Mechanisms, and Experimentation for Diffuse Computing |
|
|
|
Software Quality and Infrastructure Protection for Diffuse Computing |
|
|
559 | (8) |
|
|
|
|
|
|
|
|
Games and the Impossibility of Realizable Ideal Functionality |
|
|
567 | (18) |
|
|
|
|
|
|
Adaptable Situation-Aware Secure Services-Based Systems |
|
|
|
Adaptable Situation-Aware Secure Service-Based (AS3) Systems |
|
|
585 | (12) |
|
|
|
|
|
|
|
Automated Agent Synthesis for Situation Awareness in Service-Based Systems |
|
|
597 | (9) |
|
|
|
|
|
|
Detecting Deception in the Military Infosphere: Improving and Integrating Human Detection Capabilities with Automated Tools |
|
|
|
Detecting Deception in the Military Infosphere: Improving and Integrating Detection Capabilities with Automated Tools |
|
|
606 | (22) |
|
|
|
|
|
|
|
Detecting Concealment of Intent in Transportation Screening: A Proof-of-Concept |
|
|
628 | (17) |
|
|
|
|
|
|
|
|
|
|
|
Vulnerability Assessment Tools for Complex Information Networks |
|
|
|
Applications of Feedback Control in Information Network Security |
|
|
645 | (30) |
|
|
|
|
|
|
|
|
Anomaly Detection Using Call Stack Information |
|
|
675 | |
|
|
|
|
|