Securing software systems against malicious attack, corruption, and subversion has been an ongoing research problem. Novel applications of software configuration technology may provide solutions to these problems. Three interesting problems and potentials solutions are presented. The problems are intrusion tolerance, misuse protection, and cyber-forensics. The first two can be addressed using dynamic reconfiguration to modify the behavior of a software system. The last problem can be addressed using configuration information as a comprehensive framework on which to hang a variety of other information necessary for forensic analysis. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Heimbigner, D. (2003). Applications of configuration information to security. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2649, 259–266. https://doi.org/10.1007/3-540-39195-9_19
Mendeley helps you to discover research relevant for your work.