Abstract
The scope of “denial-of-service protection” can be limited by comparing it and contrasting it with related concepts. The objectives and general concepts that drive current research have already been clarified to some extent by prior work. We summarize the general conclusions that have emerged, and assess their implications for the development of denial-of-service protection requirements and the guidance of future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. D. Abrams, K. E. Eggers, L. J. La Padula, and I. M. Olson, “A Generalized Framework for Access Control: An Informal Description,” Proc. 1990 National Computer Security Conference, October, 1990.
E. M. Bacic and M. Kuchta, “Considerations in the Preparation of a Set of Availability Criteria,” Third Annual Canadian Computer Security Conference, Ottawa, Canada, May 1991, 283-292.
A. Bestavros, “Time-Constrained Reactive Automata,” Proc. Real-Time Systems Symposium, IEEE Computer Society, 1991, 244-253.
K. J. Biba, “Integrity Considerations for Secure Computer Systems,” ESD-TR-76, NTIS AD-A039324, Electronic Systems Division, Air Force Systems Command, April, 1977.
W. Boebert and R. Kain, “A Practical Alternative to Hierarchical Integrity Policies,” Proc. 8th National Computer Security Conference, 18-27.
D. Brewer and M. Nash, “The Chinese Wall Security Policy,” Proc. 1989 Security and Privacy Symposium, IEEE Computer Society, 206-214.
D. D. Clark and D. R. Wilson, “Comparison of Commercial and Military Computer Security Policies,” 1987 Symposium on Security and Privacy, IEEE Computer Society, 184-194.
J. Dobson, “Information and Denial of Service,” Database Security V: Status and Prospects, IFIP Transactions A-6, 1992,21-46.
V. Gligor, “A Note on the Denial-of-Service Problem,” Proc. 1983 Symposium on Security and Privacy, IEEE Computer Society, 139-149.
J. T. Haigh, R. C. O’Brien, W. T. Wood, T. G. Fine, M. J. Endrizzi, “Assured Service Concepts and Models. Volume 3. Availability in Distributed MLS Systems,” Secure Computing Technology Corp., Arden Hills, MN, January 1992.
Information Technology Security Evaluation Criteria (ITSEC), Der Bundesminister des Innern, Bonn, May 1990.
W. Hu, “Lattice Scheduling and Covert Channels,” Proc. 1992 Symposium on Security and Privacy, IEEE Computer Society, 52-61.
National Computer Security Center, “Integrity-Oriented Control Objectives,” C Technical Report 111–91, October, 1991.
National Computer Security Center, “Integrity in Automated Information Systems,” C Technical Report 79–91, September, 1991.
J. C. LaPrie (ed.), Dependability: Basic Concepts and Terminology, Springer-Verlag, 1992.
B. Littlewood, “How to Measure Reliability and How Not To,” IEEE Trans. on Reliability, Vol. R-28, No. 2, June 1979, 103–110.
N. G. Leveson, “Verification of Safety,” Safety of Computer Control Systems 1983 (SAFECOMP ’83), IFAC, Pergamon Press, New York, 1983, 167–174.
A. Mili, An Introduction to Program Fault Tolerance, Prentice Hall, New York, 1990.
J. K. Millen, “A Resource Allocation Model for Denial of Service,” Proc. 1992 Symposium on Security and Privacy, IEEE Computer Society, 137-147.
R. S. Sandhu, “Expressive Power of the Schematic Protection Model,” J. Computer Security, Vol. 1, No. 1, 1992, 59–98.
Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD, December, 1985.
C-F. Yu and V. D. Gligor, “A Specification and Verification Method for Preventing Denial of Service,” IEEE Trans. on Software Engineering, Vol. 16, No. 6, June 1990, 581–592.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 Springer-Verlag/Wien
About this paper
Cite this paper
Millen, J.K. (1995). Denial of Service: A Perspective. In: Cristian, F., Le Lann, G., Lunt, T. (eds) Dependable Computing for Critical Applications 4. Dependable Computing and Fault-Tolerant Systems, vol 9. Springer, Vienna. https://doi.org/10.1007/978-3-7091-9396-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-7091-9396-9_10
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-9398-3
Online ISBN: 978-3-7091-9396-9
eBook Packages: Springer Book Archive