An Overview of the AQuA Gateway.
M. Seri, T. Courtney, M. Cukier, and W. H. Sanders. (01SER01)
1st Workshop on The ACE ORB (TAO), St. Louis, MO, August 5-6, 2001. (Presented but not published in a proceedings.)
A Configurable CORBA Gateway for Providing Adaptable System Properties.
M. Seri, T. Courtney, M. Cukier, V. Gupta, S. Krishnamurthy, J. Lyons, H. Ramasamy, J. Ren, and W. H. Sanders. (02SER01)
Supplemental Volume of the 2002 International Conference on Dependable Systems & Networks (DSN-2002), Washington, DC, June 23-26, 2002, pp. G-26 to G-30.
Providing Intrusion Tolerance with ITUA.
T. Courtney, J. Lyons, H. V. Ramasamy, W. H. Sanders, M. Seri, M. Atighetchi, P. Rubel, C. Jones, F. Webber, P. Pal, R. Watro, M. Cukier, and J. Gossett. (02COU01)
Supplemental Volume of the 2002 International Conference on Dependable Systems & Networks (DSN-2002), Washington, DC, June 23-26, 2002, pp. C-5-1 to C-5-3.
Passive Replication Schemes in AQuA.
Y. (J.) Ren, P. Rubel, M. Seri, M. Cukier, W. H. Sanders, and T. Courtney. (02REN01)
Proceedings of the 2002 Pacific Rim International Symposium on Dependable Computing (PRDC 2002), Tsukuba, Japan, December 16-18, 2002, pp. 125-130. [IEEE Xplore entry]
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects.
Y. (J.) Ren, D. E. Bakken, T. Courtney, M. Cukier, D. A. Karr, P. Rubel, C. Sabnis, W. H. Sanders, R. E. Schantz, and M. Seri. (99CUK04)
IEEE Transactions on Computers, vol. 52, no. 1, January 2003, pp. 31-50. [IEEE Xplore entry]
An Architecture for Adaptive Intrusion-Tolerant Applications.
P. Pal, P. Rubel, M. Atighetchi, F. Webber, W. H. Sanders, M. Seri, H. Ramasamy, J. Lyons, T. Courtney, A. Agbaria, M. Cukier, J. Gossett, and I. Keidar. (04PAL01)
Special issue of Software: Practice and Experience on Experiences with Auto-adaptive and Reconfigurable Systems, vol. 36, no. 11-12, September-October 2006, pp. 1331-1354.
Verifying SCADA Network Access Control Policy Implementations Using the Access Policy Tool.
S. Singh, D. M. Nicol, W. H. Sanders, and M. Seri. (07SIN01)
First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, March 18-21, 2007. (Presented but not published in a proceedings.)
The CoBFIT Toolkit.
H. Ramasamy, M. Seri, and W. H. Sanders. (07RAM01)
Proceedings of the 26th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2007), Portland, Oregon, Aug. 12-15, 2007, pp. 350-351. [ACM DOI: http://dx.doi.org/10.1145/1281100.1281167]
Automatic Verification of Distributed and Layered Security Policy Implementations.
S. Singh, W. H. Sanders, D. M. Nicol, and M. Seri. (08SIN02)
University of Illinois at Urbana-Champaign Coordinated Science Laboratory technical report UILU-ENG-08-2209 (CRHC-08-05), July 2008.
Usable Global Network Access Policy for Process Control Systems.
D. M. Nicol, W. H. Sanders, S. Singh, and M. Seri. (08NIC01)
IEEE Security & Privacy, vol. 6, no. 6, November-December 2008, pp. 30-36. [IEEE Xplore entry]
Experiences Validating the Access Policy Tool in Industrial Settings.
D. M. Nicol, W. H. Sanders, M. Seri, and S. Singh. (09NIC01)
Proceedings of the 43rd Annual Hawai'i International Conference on System Sciences (HICSS), Koloa, Kauai, Hawaii, January 5-8, 2010, pp. 1-8. [IEEE Xplore entry]
|