Grid systems are designed to support very large data set computations, that potentially access significant resources spread through several organizations. These resources can be v...
Luis Sardinha, Nuno Ferreira Neves, Paulo Ver&iacu...
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Fault-tolerant protocols, asynchronous and synchronous alike, make stationary fault assumptions: only a fraction f of the total n nodes may fail. Whilst a synchronous protocol is ...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...