Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   12  
      Distributed ComputingComputer NetworksSecurityComputer Security
    • by 
    •   12  
      Computer ArchitectureComputer VisionDatabase SystemsComputer Networks
    • by 
    •   8  
      Computer ArchitectureSecurity and PrivacySystem ArchitectureWorms
    • by 
    •   5  
      Fault ToleranceData ReplicationByzantine Fault ToleranceLDAP
    • by 
    •   24  
      Distributed ComputingWireless SystemsRouting algorithmFault Tolerance
    • by 
    •   8  
      Information SystemsComputer ScienceGroup communicationComputer Software
    • by 
    •   9  
      Distributed ComputingNetworksComputer SecurityDomain Name System
    • by 
    •   5  
      Intrusion DetectionDecision TreeShannon entropyTsallis Entropy
    • by 
    •   9  
      Computer ScienceDigital SignatureDistributed SystemTime Complexity
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusiontolerant system... more
    • by 
    •   9  
      Computer ArchitectureSecurity and PrivacySystem ArchitectureWorms
    • by 
    •   2  
      Distributed ComputingIntrusion Tolerance
    • by  and +1
    •   5  
      MiddlewareElectric PowerFault TolerantMonitoring and control
    • by 
    •   10  
      Access ControlDistributed SystemMiddlewareInformation Infrastructure
    • by 
    •   7  
      System IntegrationVirtual MachinesOPERATING SYSTEMComplex System
    • by 
    •   7  
      Human Computer InteractionSocial InteractionUser InterfaceCross layer Security Design
    • by 
    •   2  
      Performance EvaluationIntrusion Tolerance
Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular... more
    • by  and +2
    •   9  
      Distributed ComputingSecurityCloudAES encryption
    • by 
    •   4  
      Computational ComplexityRandom Oracle ModelSecret SharingIntrusion Tolerance
    • by 
    •   11  
      Computer ScienceAccess ControlVirtual MachineEconomic Impact
    • by 
    •   8  
      Economic ImpactSecurity PolicyAccess Control ModelsPower Grid
    • by 
    •   6  
      Distributed SystemSystem modelingFault TolerantDependable Systems
    • by 
    •   9  
      Digital ContentPeer to PeerContent ProtectionSecret Sharing
We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on... more
    • by 
    •   8  
      OPERATING SYSTEMIntrusion DetectionDynamic Software AdaptationDynamic Router Configuration protocol
    • by 
    •   5  
      Intrusion DetectionLevel of ServiceProxy ServerFault Tolerant
Abstract—We propose a resilience architecture for improving the security and dependability of authentication and au-thorization infrastructures, in particular the ones based on RADIUS and OpenID. This architecture employs... more
    • by 
    •   9  
      Network SecurityComputer SecurityNetworkDependability
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusiontolerant system... more
    • by 
    •   9  
      Computer ArchitectureSecurity and PrivacySystem ArchitectureWorms
    • by 
    •   3  
      Fault TolerantControl AlgorithmIntrusion Tolerance
    • by 
    •   16  
      DoS AttackSecurity in routing protocolsOPERATING SYSTEMIntrusion Detection
    • by 
    •   3  
      Group communicationFault ToleranceIntrusion Tolerance
    • by 
    •   6  
      NetworksMiddlewareOpen SourceClient Server
    • by  and +1
    •   6  
      NetworksGroup communicationGroup membershipExperimental Evaluation
    • by 
    •   7  
      EngineeringQuantitative analysisSystem ArchitectureIntrusion Prevention
The same network infrastructure, that is essential for the operation of today's high valued distributed information systems, can also be misused by malicious attackers. Experience shows that implementing absolute security or... more
    • by 
    •   4  
      Sound DesignDistributed SystemCase StudyIntrusion Tolerance
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusiontolerant system... more
    • by 
    •   9  
      Computer ArchitectureSecurity and PrivacySystem ArchitectureWorms
    • by 
    •   3  
      ResilienceByzantine Fault ToleranceIntrusion Tolerance
    • by 
    •   8  
      Computer ScienceDistributed ComputingSystem ArchitectureICSE
    • by 
    •   14  
      Computer ScienceComputer NetworksComputer SecurityControl Systems
    • by 
    •   4  
      XMLAvailabilityInternetIntrusion Tolerance
    • by 
    •   9  
      Graph TheoryDistributed SystemIntrusion DetectionLarge classes
    • by 
    •   9  
      Information SystemsComputer NetworksInformation SharingQuality of Service
    • by 
    •   16  
      Information SystemsComputer ScienceComputer SecurityFace Detection
    • by 
    •   7  
      Service Oriented ArchitectureSoftware ArchitectureQuality of ServiceReliability
    • by 
    •   5  
      Cognitive ControlIntelligent ControlDefense MechanismsWork in Progress
    • by  and +2
    •   5  
      NetworksSteady stateSoftware SystemsStochastic Model
    • by 
    •   15  
      EngineeringComputer ScienceAccess ControlDistributed System
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconnections and security against malicious actions. Tuple... more
    • by 
    •   19  
      Computer ScienceFault ToleranceMiddlewareDistributed Processing
    • by 
    •   11  
      Software ReliabilityComputer VirusesDigital SignaturesComputer Network Security
    • by 
    •   15  
      Distributed AlgorithmsMarkov ProcessesSensitivity AnalysisComputer Software
Intrusion tolerance has been proposed as a new paradigm for computer systems security. The idea is to apply the fault tolerance paradigm in the domain of systems security accepting that malicious faults (attacks, intrusions) can never be... more
    • by 
    •   3  
      System SecurityFault TolerantIntrusion Tolerance
    • by 
    •   5  
      NetworksSteady stateSoftware SystemsStochastic Model