<--- Back to Details
First PageDocument Content
Data synchronization / Computer storage / Theory of computation / Replication / Byzantine fault tolerance / Intrusion tolerance / State machine replication / Fault-tolerant system / Communications protocol / Computing / Fault-tolerant computer systems / Fault tolerance
Date: 2013-09-20 16:47:28
Data synchronization
Computer storage
Theory of computation
Replication
Byzantine fault tolerance
Intrusion tolerance
State machine replication
Fault-tolerant system
Communications protocol
Computing
Fault-tolerant computer systems
Fault tolerance

INTRUSION-TOLERANT REPLICATION UNDER ATTACK by Jonathan Kirsch

Add to Reading List

Source URL: www.dsn.jhu.edu

Download Document from Source Website

File Size: 1,22 MB

Share Document on Facebook

Similar Documents

Software / Computing / Cyberwarfare / Computer network security / Computer security / Warez / Zero-day / Vulnerability database / Vulnerability / Common Vulnerabilities and Exposures / NetBSD / Solaris

OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

DocID: 1lXfb - View Document

Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

DocID: 1lTNK - View Document

Intrusion Tolerance The Crutial Way of Critical Infrastructure Protection Critical infrastructures are essentially physical processes controlled by networked computers. They’re usually as

DocID: 1lwb3 - View Document

Data synchronization / Fault-tolerant computer systems / State machine replication / Replication / Fault tolerance / Wormhole / Replica / Recovery approach

Resilient Intrusion Tolerance through Proactive and Reactive Recovery∗ Paulo Sousa Alysson Neves Bessani Miguel Correia Nuno Ferreira Neves Paulo Verissimo

DocID: 1lhGo - View Document

Computing / Engineering / Physics / Data synchronization / Fault-tolerant computer systems / Replication / Wormhole / Replica / Fault tolerance

1 Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery Paulo Sousa, Member, IEEE, Alysson Neves Bessani, Miguel Correia, Member, IEEE, Nuno Ferreira Neves, Member, IEEE, Paulo Verissimo, Fellow,

DocID: 1kzrv - View Document