[1] Westmark V R.A definition for information system survivability [C]//Proc of the 37th International Conference on System Sciences.Washington, DC:IEEE Computer Society Press, 2004:2086-2096.
[2] Ellison R J, Fisher D A, Linger R C, et al.Survivable network systems:an emerging discipline[R].Software Engineering Institute of Carnegie Mellon University, 1997.
[3] Linger R C, Mead N R, Lipson H F.Requirements definition for survivable network systems [C]//Proc of the Third International Conference on Requirements Engineering.Los Alamitos, CA, USA, 1998:14-23.
[4] Richard C L, Howard F L, John M, et al.Life-cycle models for survivable systems, CMU/SEI-2002-ESC-TR-026[R].Boston:Carnegie Mellon University, 2002.
[5] Zinky J A, Bakken D E, Schantz R.Architectural support for quality of service for CORBA objects [J].Theory and Practice of Object Systems, 1997, 3(1):55-73.
[6] Liu Peng.Architectures for intrusion tolerant database systems [C]//Proc of the Foundations of Intrusion Tolerant Systems (OASIS’03).Las Vegas, Nevada, 2003:3-13.
[7] Wang F, Gong F, Jou F, et al.SITAR:a scalable intrusion tolerance architecture for distributed services[C]//Proc of the 2001 IEEE Workshop on Information Assurance and Security.New York:IEEE Press, 2001:38-45.
[8] Knight J C, Heimbigner D, Wolf A, et al.The willow architecture:comprehensive survivability for large-scale distributed applications [C]//Proc of the International Conference on Dependable Systems and Networks.New York:IEEE Press, 2002:54-74.
[9] Tally G, Whitmore B, Sames D.Intrusion tolerant distributed object systems:project summary[C]//Proc of the DARPA Information Survivability Conference and Exposition.Washington, DC:IEEE Computer Society Press, 2003:149-151.