1Leonard J. Lapadula State of the Art in Anomaly Detection and Reaction:[Technical report]. MITRE, Bedford, Massachusetts,1999
2Jajodia S, Ammann P, McCollum C D. Surviving information warfare attacks. IEEE Computer, 1999,32(4): 57-63
3Anderson R H. Research and Development Initiatives Focused on Preventing, Detecting, and Responding to Insider Misuse of Critical Defense Information Systems: Results of a Three-Day Workshop. RAND CF-151-OSD, 1999
4Insider Threat Integrated Process Team, Department of Defense (DoD-IPT), 2000. Available at http://www. c3i. osd. mil
5DoD Insider Threat Mitigation. U.S. Department of Defense,2000. Available at http://www. c3i. osd. mil
6Lee P A,Anderson T. Fault Tolerance: Principles and Practice.Springer-Verlag, Wien, Austria, second edition, 1990
7Bernstein P A, Hadzilacos V,Goodman N. Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading,MA, 1987
8Gray J, Reuter A. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, San Mateo, CA,1993
9Weikum G, Vossen G. Transactional Information Systems:Theory, Algorithms, and the Practice of Concurrency Control and Recovery. Morgan Kaufmann Publishers, 2001
10Ammann P, Jajodia S, Liu P. A Fault Tolerance Approach to Survivability. In:Proc. of the Computer Security, Dependability,and Assurance: From Needs to Solutions, York , England and Washington DC, USA,1998