Back to Results
First PageMeta Content
Data synchronization / Computer storage / Theory of computation / Replication / Byzantine fault tolerance / Intrusion tolerance / State machine replication / Fault-tolerant system / Communications protocol / Computing / Fault-tolerant computer systems / Fault tolerance


INTRUSION-TOLERANT REPLICATION UNDER ATTACK by Jonathan Kirsch
Add to Reading List

Document Date: 2013-09-20 16:47:28


Open Document

File Size: 1,22 MB

Share Result on Facebook

City

Baltimore / Dependable Forwarder / Erasure Encoding / Hub / /

Company

Distributed Systems / Wide-Area Networks / Telcordia Technologies / Transaction Processing Systems / Ketzev / Advanced Distributed Systems / /

Continent

Europe / /

Country

Portugal / /

Event

Person Travel / /

Facility

The Johns Hopkins University / University of Lisboa / /

IndustryTerm

faulttolerant replication systems / intrusion-tolerant replication protocol / large-scale survivable systems / large software systems / resilient systems / a cappella / intrusion-tolerant replication protocols / malicious processors / /

Organization

Dissertation Organization / Defense Advanced Research Projects Agency / The Johns Hopkins University / National Science Foundation / Yale / University of Lisboa / GBO committee / /

Person

Josh Olsen / Kari Sepelyak / Michael Kaplan / Giuseppe Ateniese / Jonathan Kirsch / Michal Miskin-Amir / Brian Coan / John Schultz / Santos Veronese / Michael J. Fischer / Randal Burns Brian Coan iii / Nilo Rivera / Barbara / Antonio Casimiro / David Zage / John Lane / Andreas Terzis / Bob / Jaime / Robert Rynasiewicz / Randal Burns / Paulo Ver´ıssimo / Nancy / Danny Dolev / Cristina Nita-Rotaru / Miguel Correia / Jonathan Stanton / Marina Blanton / Paulo Sousa / Arvind Krishnamurthy / Yair Amir / Chris / Jacob Green / /

Position

Suspect-Leader / Advisor / researcher / role model / /

ProvinceOrState

Delaware / /

Technology

intrusion-tolerant replication protocols / Prime Replication Protocol / Prime View Change Protocol / Ordering Sub-Protocol / Leader Election Sub-Protocol / View Change Protocol / Decentralized Intrusion-Tolerant Replication Protocol / Reconciliation Sub-Protocol / State Machine Replication Protocols / intrusion-tolerant replication protocol / /

SocialTag