Back to Results
First PageMeta Content
Computing / Application security / Web application security / OWASP / Vulnerability / Application architecture / Penetration test / Proxy server / Load balancing / Computer network security / Computer security / Cyberwarfare


Submitted for publication. Not for redistribution. Architecture-Based Self-Protecting Software Systems Eric Yuan, Sam Malek George Mason University 4400 University Drive
Add to Reading List

Document Date: 2013-03-08 09:47:09


Open Document

File Size: 931,32 KB

Share Result on Facebook

City

New York / Zurich / Berlin / Znn Agreement / /

Company

Component-Based Systems / IBM / Cambridge University Press / Self-Managing Systems / Intrusion Tolerant Systems / Oracle / IEEE Software / Survivable Information Systems / Self-Adaptive Systems / MITRE Corporation / Microsoft / /

Country

Switzerland / United States / United Kingdom / /

/

Event

Product Issues / Product Recall / /

Facility

Carnegie Mellon University / Sam Malek George Mason University / Keele University / University Drive Fairfax / Jeff Gennari Carnegie Mellon University / /

IndustryTerm

software system / detection systems / self-protecting software systems / news site / Cross-site / web applications / software agents / software system using architectural models / web server instance / software security / web server implementations / web application / infrastructure applications / web application security threats / Web Application Security Project / self-protecting software / transition applications / point solutions / separate software processes / software component / tainted web servers / software systems / autonomous computing principles / detection device / dangerous software errors / Similar agreement-based voting protocols / web servers / static analysis tools / autonomic computing environment / idle web server pool containing / adaptive proxy server / autonomic computing / software applications / web application level / web attacks / classical control systems / basic web application architecture / e-commerce environment / tolerant systems / web server document root / response systems / Software rejuvenation / web application threats / web server host / web-based client-server system / web server / overwhelmed web server / self-adapting systems / self-protecting systems / software architectures / software architecture / running web servers / /

Movie

Rainbow / /

OperatingSystem

DoS / /

Organization

Army Research Office / Cambridge University / Defense Advanced Research Projects Agency / National Science Foundation / CCF1217503 / Internal Revenue Service / School of Computer Science / George Mason University / Carnegie Mellon University / Keele University / Institute for Software Research / /

Person

M. MAX MALICIOUS / Jeff Gennari Carnegie / RAINBOW OF PATTERNS / Sam Malek George / Bradley Schmerl / /

Position

ARchitecture Manager / system administrator / guard / adaptation engineer / Manager 2 1 Gauges Translation Infrastructure / DB Guard / evaluator / adaptation manager / administrator / Adaptation Manager Architecture Evaluator Model Manager / Application Guard / database guard / model / /

Product

Edition Injection / section / Znn / SQL injection / nodes / Authentication / web servers / Session Management Insecure Direct Object References Cross-Site Request Forgery / /

ProgrammingLanguage

SQL / php / /

PublishedMedium

the Znn news / Journal of Systems and Software / IEEE Software / Lecture Notes in Computer Science / /

Technology

virtual machine / LAN / following algorithm / API / Similar agreement-based voting protocols / WAN / TCP/IP / encryption / proxy server / firewall / HTTP / voting algorithm / agreement-based protocol / web server / /

URL

http /

SocialTag