Sciweavers

155 search results - page 7 / 31
» Tolerating Intrusions in Grid Systems
Sort
View
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
14 years 2 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
OPODIS
2010
13 years 6 months ago
Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value
: Provide application processes with strong agreement guarantees despite failures is a fundamental problem of fault-tolerant distributed computing. Correct processes have not to be...
Achour Mostéfaoui, Michel Raynal
CGO
2005
IEEE
14 years 2 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 8 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
EGC
2005
Springer
14 years 2 months ago
Fault Tolerance in the R-GMA Information and Monitoring System
R-GMA (Relational Grid Monitoring Architecture) [1] is a grid monitoring and information system that provides a global view of data distributed across a grid system. R-GMA creates ...
Rob Byrom, Brian A. Coghlan, Andrew W. Cooke, Rone...