Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Abstract: We show how to leverage trusted computing technology to design an efficient fully-passive replicated system tolerant to arbitrary failures.
Abstract—We show how to leverage trusted computing tech- nology to design an efficient fully-passive replicated system tolerant to arbitrary failures.
Securing Passive Replication. Through Verification. Bruno Vavala1,2, Nuno Neves1, Peter Steenkiste2. 1University of Lisbon (Portugal). 2Carnegie Mellon ...
Abstract: We show how to leverage trusted computing technology to design an efficient fully-passive replicated system tolerant to arbitrary failures.
This work shows how to leverage trusted computing technology to design an efficient fully-passive replicated system tolerant to arbitrary failures, ...
Sep 28, 2015 · We show how to leverage trusted computing technology to design an efficient fully-passive replicated system tolerant to arbitrary failures.
Sep 6, 2023 · Monitoring and auditing: Real-time monitoring and auditing of replicated data help detect anomalies, suspicious activities and unauthorized ...
Missing: Passive | Show results with:Passive
Nov 15, 2024 · In this article, you learn how to configure passive geo-replication on a pair of Azure Cache for Redis instances using the Azure portal.
People also ask
Dec 18, 2018 · Passive DNS data is a valuable source of intelligence data that can help your IT team and security researchers run a deep analysis of your DNS, domain and IP ...
Cross-cluster replication uses an active-passive model. You index to a leader index, and the data is replicated to one or more read-only follower indices.