Third IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2007) 2007
DOI: 10.1109/isdasc.2007.4351393
|View full text |Cite
|
Sign up to set email alerts
|

How to Update Dependable Secure Computing Systems from a Survivability Assessment Perspective?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2008
2008
2008
2008

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The same model but based on the survivability assessment technique that has been discussed in [2]. In this paper, the survivability of the dependable secure computing system can be computed as follows …”
Section: Comparison With Survivability Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The same model but based on the survivability assessment technique that has been discussed in [2]. In this paper, the survivability of the dependable secure computing system can be computed as follows …”
Section: Comparison With Survivability Modelmentioning
confidence: 99%
“…In conclusion, we present a different approach to determine the optimal updating time using the reliability theory.This approach is different than the analysis using the survivability assessment [2]. Conceptually, We believe that we need integrate these two different approaches.…”
Section: Comparison With Survivability Modelmentioning
confidence: 99%