Specifying and using intrusion masking models to process distributed operations

Meng Yu, Peng Liu, Wanyu Zang. Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security, 13(4):623-658, 2005. [doi]

Abstract

Abstract is missing.