Applications of configuration information to security

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Securing software systems against malicious attack, corruption, and subversion has been an ongoing research problem. Novel applications of software configuration technology may provide solutions to these problems. Three interesting problems and potentials solutions are presented. The problems are intrusion tolerance, misuse protection, and cyber-forensics. The first two can be addressed using dynamic reconfiguration to modify the behavior of a software system. The last problem can be addressed using configuration information as a comprehensive framework on which to hang a variety of other information necessary for forensic analysis. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Heimbigner, D. (2003). Applications of configuration information to security. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2649, 259–266. https://doi.org/10.1007/3-540-39195-9_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free