Web-service-related techniques have become popular to improve system integration and interaction. In distributed and dynamic environment, web services’ availability has been reg...
Lingshuang Shao, Junfeng Zhao, Tao Xie, Lu Zhang, ...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Abstract. The research in the paper is motivated by building a decentralized/P2P XML storage on top of a DHT (Distributed Hash Table). The storage must provide high data availabili...
In recent years, new highly scalable storage systems have significantly contributed to the success of Cloud Computing. Systems like Dynamo or Bigtable have underpinned their abil...
Simon Loesing, Martin Hentschel, Tim Kraska, Donal...
Reliable Server Pooling (RSerPool) is a light-weight protocol framework for server redundancy and session failover, currently still under standardization by the IETF RSerPool WG. ...