Skip to main content

Trust in Cyberspace (1999) / Chapter Skim
Currently Skimming:

Appendix J: Research in Information System Security and Survivability Funded by NSA and DARPA
Pages 298-299

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.

From page 298...
... . Heterogeneity Preferential Replication/Lifespan, Architectural/Software Diversity, Path Diversity, Randomized Compilation, Secure Heterogeneous Environments NSA R2 = 0 projects; DARPA ITO = 2 projects Static Resource Allocation Hardware Technology NSA R2 = 1 project; DARPA ITO = 0 projects Dynamic Resource Allocation Detect & Respond to Attacks/Malfunctions, Dynamic Quality of Services, Active Packet/Node Networks, Dynamic Security Management NSA R2 = 3 projects; DARPA ITO = 12 projects Redundancy Replication NSA R2 = 0 projects; DARPA ITO = 3 projects 298
From page 299...
... Useful? Santa Monica, CA: RAND National Defense Research Institute, in press.

This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.