2011-5-11
 
Account:
 
Password:
     
Home | E-Business | Technology | Software Engineering | Security | Education | Outsourcing
Technology
Internet of Things/EPC 
Audio Mining & Voice Portal
Pen Computing
Creativity & Innovation
Creativity Techniques 
Semantic Web
Web Intelligence
Adaptive Web
Data Warehouse ...
P2P Computing
Interspace
Digital Game ...
Real-Time Computing
Data Synchronization
Component Framework
Middleware
Multimedia
Product Line ...
Software Mass ...
Embedded Apps ...
Embedded Testing
Real-Time OS
Embedded DB
Programmable DSP
Electronic Design ...
Codesign
Security Technology
DRM
Trends in IT
Artificial Intelligence
Open Source
OLAP/Data Mining
e-Business
AOP
GP
CSCW
Workflow Management
Bioinformatics
DNA Computing
Quantum Computing
HPC
Parallel Computing
Internet
New Tech Resources
Blog
RSS
Wi-Fi
LMDS
Wireless Application
Pervasive Computing
Flexible Transistor
Document Clustering
Document English 
 
 Content
Experts  
Industry Report
Shanghai SPIN  
Services
 Column
Tom Gilb
Q & A
Advanced Inspections
Inspection Economics
Evo Project Management
 
Survivability
 
Survivability Concepts
http://www.cse.ogi.edu/DISC/projects/immunix/survivability.html
Survivability: Protecting Your Critical Systems
http://www.cert.org/archive/html/protect-critical-systems.html
Information Survivability for Critical Infrastructure Protection
http://www.cs.virginia.edu/~survive/
Information Assurance & Survivability
http://www.iaands.org/
Fault Tolerant Networks (FTN)
http://www.iaands.org/FTN_Main.htm
Composable High Assurance Trusted Systems (CHATS)
http://www.iaands.org/CHATS/
Architectural Frameworks for Composable Survivability and Security
http://www.csl.sri.com/users/neumann/chats.html
Survivability: A Technical and Business Perspective on Security
http://www.cert.org/archive/pdf/icre.pdf
Survivable Network Systems: An Emerging Discipline
http://www.cert.org/research/97tr013.pdf
Requirements Definition for Survivable Network Systems
http://www.cert.org/archive/pdf/icre.pdf
Foundations for Survivable System Development: Service Traces, Intrusion Traces, and
Evaluation Models
http://www.cert.org/archive/pdf/01tr029.pdf
A Simulation Model For Managing Survivability of Networked Information Systems
http://www.cert.org/research/00tr020.pdf
Survivable System Analysis Method
http://www.cert.org/archive/html/analysis-method.html
Assessing Survivability of Critical Systems
http://www.cert.org/archive/html/assess-surviv.html
Analyzing Survivability Properties of Specifications of Networks
http://www-2.cs.cmu.edu/afs/cs.cmu.edu/project/calder/www/dsn00.html
Easel Survivability Simulation
http://www.cert.org/easel/
Emergent Algorithms: A New Method for Enhancing Survivability in Unbounded Systems
http://www.cert.org/archive/html/emergent-algor.html
Design and Implementation of EASEL A Language for Simulating Highly Distributed Systems
http://www.cert.org/archive/pdf/design-easel.pdf
Survivability in Object Services Architectures
http://www.objs.com/Survivability/
Survivability Project Web Page
http://dis.cs.umass.edu/research/survive/
Technology Assessment of High Capacity Data Storage Systems: Can We Avoid A Data Survivability Crisis?
http://sdcd.gsfc.nasa.gov/ESDCD/whitepaper.data_survive.html
Adaptive Multi-Layer Network Survivability: A Unified Framework for Countering Cyber-Terrorism
http://www.isi.edu/gost/cctws/yurcik.PDF
 
 

 Links: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
Shanghai IT || Shanghai Economic Commission || SSIA || Shanghai Component Repository
LJYW || SPRT || PKSPIN || CCW Shanghai || China IT Outsourcing Summit more 
contribution guide | FAQ | about | copyright | contact
last update on 2005-04-08
better use IE 5.0 or above (800*600 or above)
© 2000-2005 Software Export and IT Transfer Center, ASTI Shanghai
All Rights Reserved.