Back to Results
First PageMeta Content
Transmission Control Protocol / Replication / Computer architecture / Network protocols / Fault-tolerant computer systems / Data synchronization / Computing


ByzID: Byzantine Fault Tolerance from Intrusion Detection Sisi Duan Karl Levitt Hein Meling Sean Peisert Haibin Zhang
Add to Reading List

Document Date: 2014-11-29 05:01:28


Open Document

File Size: 539,88 KB

Share Result on Facebook

City

Anomaly / PECIFICATION / /

Company

Google / /

/

Event

Product Issues / Reorganization / FDA Phase / /

IndustryTerm

network-based intrusion detection systems / time-critical applications / local area network / real-time notification / Internet Firewall IDS ByzID Replica / backup protocol / intrusion detection systems / wide area networks / backup reconfiguration protocols / fault-tolerant protocol / non-replicated client/server / infrastructure services / replica reconfiguration protocols / reconfiguration protocol / graph network / agreement protocol / incomplete graph network / network services / registration systems / software bugs / fairness-critical applications / crash fault tolerant protocol / node processing delays / replication protocol / cloud computing infrastructures / checkpoint protocol / fault-free protocol / real-time monitoring / slower backup protocol / /

NaturalFeature

Event Engine Event Stream / /

OperatingSystem

Linux / /

Organization

University of Stavanger / Norway UC / /

Person

Sean Peisert Haibin Zhang / Karl Levitt Hein Meling Sean / /

Position

policy interpreter / human administrator / ByzID specifications Policy Script Interpreter / policy script interpreter / /

Product

Stream / IDSs / ByzID / Paxos / MACs / LANs / Zyzzyva / actors / behavior / replicas / backup / primary / backups / replica / /

ProgrammingLanguage

C++ / /

Technology

LAN / RAM / four BFT protocols / backup reconfiguration protocols / 3 GHz Xeon processor / fault-free protocol / agreement protocol / reconfiguration protocol / Linux / ordering protocol / backup protocol / ByzID checkpoint protocol / BFT protocols / Byzantine fault-tolerant protocol / WAN / RSM protocol / ByzID replication protocol / cryptography / crash-resilient protocols / 10 Clients Protocol / 60 Clients Protocol / firewall / prescribed ByzID protocol / ByzID protocol / slower backup protocol / BFT protocol / checkpoint protocol / two key technologies / replica reconfiguration protocols / crash fault tolerant protocol / client/server / /

SocialTag