Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
In this paper, we proposed a novel scheme, named as TCP-ABC, which replicates the server side TCP connections among multiple server nodes of a cluster. By guaranteeing atomic reque...
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Service-Oriented architectures and Service-Oriented Computing are the most recent approaches aiming at facilitating the design and development of applications on distributed system...
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...