4Thomas Wu, Michael Malkin, Dan Boneh. Building Intrusion Tolerant Applications [ J ]. In Proceedings of the 8th USENIX Symposium, Washington, D. C. USA, August 22- 26, USENIX Association, 1999:79 - 91. 被引量:1
5Yves Deswarte, Laurent Blain, Jean - Charles. Intrusion Tolerance in Distributed Computing Systems[J]. In Proc.12th IEEE Symposium on Security & Privacy, 1991:110-121. 被引量:1
7Deswarte Y,Blain L,Fabre J C.Intrusion Tolerance in Distributed Computing Systems[C].Proc.of the International Symposium on Security and Privacy,Oakland,CA.IEEE Press,1991. 被引量:1
8Wang Dazhi,Madan B B,Trivedi K S.Security Analysis of SITAR Intrusion Tolerance System[C].Proc.of SSRS '03,Fairfax,Virginia,USA,2003-10-31. 被引量:1
9OMG.The Common Object Request Broker:Architecture and Specification(Revision 2.5)[Z].2001. 被引量:1
10Castro M,Liskov B.Proactive Recovery in a Byzantine-fault-tolerant System[C].Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation,2000-10. 被引量:1