Abstract
A practical toolkit implementing the key proactive mechanisms is presented. The toolkit provides secure interfaces to make it easy for applications to recover from penetrations. The toolkit also addresses other critical implementation issues, such as the initialization of the proactive secure system.
Original language | English |
---|---|
Pages | 18-27 |
Number of pages | 10 |
DOIs | |
State | Published - 1999 |
Externally published | Yes |
Event | Proceedings of the 1999 6th ACM Conference on Computer and Communications Security (ACM CCS) - Singapore, Singapore Duration: 2 Nov 1999 → 4 Nov 1999 |
Conference
Conference | Proceedings of the 1999 6th ACM Conference on Computer and Communications Security (ACM CCS) |
---|---|
City | Singapore, Singapore |
Period | 2/11/99 → 4/11/99 |