Abstract
A practical toolkit implementing the key proactive mechanisms is presented. The toolkit provides secure interfaces to make it easy for applications to recover from penetrations. The toolkit also addresses other critical implementation issues, such as the initialization of the proactive secure system.
| Original language | English |
|---|---|
| Pages | 18-27 |
| Number of pages | 10 |
| DOIs | |
| State | Published - 1999 |
| Externally published | Yes |
| Event | Proceedings of the 1999 6th ACM Conference on Computer and Communications Security (ACM CCS) - Singapore, Singapore Duration: 2 Nov 1999 → 4 Nov 1999 |
Conference
| Conference | Proceedings of the 1999 6th ACM Conference on Computer and Communications Security (ACM CCS) |
|---|---|
| City | Singapore, Singapore |
| Period | 2/11/99 → 4/11/99 |
Fingerprint
Dive into the research topics of 'Proactive security toolkit and applications'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver