-
1
-
-
33747844327
-
Dynamic Load Balancing on Web-server Systems
-
V. Cardellini, M. Colajanni, and P. S. Yu, "Dynamic Load Balancing on Web-server Systems," IEEE Internet Computing, Vol. 3, No. 3, pp. 28-39, 1999
-
(1999)
IEEE Internet Computing
, vol.3
, Issue.3
, pp. 28-39
-
-
Cardellini, V.1
Colajanni, M.2
Yu, P.S.3
-
3
-
-
0002873169
-
Intrusion Tolerance Approaches in ITUA
-
FastAbstract
-
M. Cukier, J. Lyons, P. Pandey, H. V. Ramasamy, W. H. Sanders, P. Pal, F. Webber, R. Schantz, J. Loyall, R. Watro, M. Atighetchi, and J. Gossett, "Intrusion Tolerance Approaches in ITUA," FastAbstract in Supplement of the 2001 International Conference on Dependable Systems and Networks, pp. B64-B65, 2001
-
(2001)
2001 International Conference on Dependable Systems and Networks
, Issue.SUPPL.
-
-
Cukier, M.1
Lyons, J.2
Pandey, P.3
Ramasamy, H.V.4
Sanders, W.H.5
Pal, P.6
Webber, F.7
Schantz, R.8
Loyall, J.9
Watro, R.10
Atighetchi, M.11
Gossett, J.12
-
4
-
-
0036821893
-
The Möbius Framework and Its Implementation
-
October
-
D. D. Deavours, G. Clark, T. Courtney, D. Daly, S. Derisavi, J. M. Doyle, W. H. Sanders, and P. G. Webster, "The Möbius Framework and Its Implementation," IEEE Trans. on Software Engineering, Vol. 28, No. 10, pp. 956-969, October 2002
-
(2002)
IEEE Trans. on Software Engineering
, vol.28
, Issue.10
, pp. 956-969
-
-
Deavours, D.D.1
Clark, G.2
Courtney, T.3
Daly, D.4
Derisavi, S.5
Doyle, J.M.6
Sanders, W.H.7
Webster, P.G.8
-
6
-
-
0026155432
-
Intrusion Tolerance in Distributed Computing Systems
-
Y. Deswarte, L. Blain, J. C. Fabre, "Intrusion Tolerance in Distributed Computing Systems," Proc. IEEE Symposium on Security and Privacy, pp. 110-121, 1991
-
(1991)
Proc. IEEE Symposium on Security and Privacy
, pp. 110-121
-
-
Deswarte, Y.1
Blain, L.2
Fabre, J.C.3
-
7
-
-
35248893706
-
-
DARPA OASIS Program
-
Draper Laboratories, Inc., "Kinetic Application of Redundancy to Mitigate Attacks," DARPA OASIS Program, http://www.tolerantsystems.org/ ProjectSummaries/IT_Using_Masking_Redundancy_and_Dispersion.html
-
Kinetic Application of Redundancy to Mitigate Attacks
-
-
-
8
-
-
35248879600
-
Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures
-
to appear
-
V. Gupta, V. Lam, H. V. Ramasamy, W. H. Sanders, and S. Singh, "Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures," CRHC Technical Report, 2003, to appear
-
(2003)
CRHC Technical Report
-
-
Gupta, V.1
Lam, V.2
Ramasamy, H.V.3
Sanders, W.H.4
Singh, S.5
-
9
-
-
0029725003
-
An Analysis of a Secure System Based on Trusted Components
-
Gaithersburg, Maryland
-
U. Lindqvist, T. Olovsson, and E. Jonsson, "An Analysis of a Secure System Based on Trusted Components," Proc. Eleventh Annual Conf. on Computer Assurance (COMPASS '96), pp. 213-223, Gaithersburg, Maryland, 1996
-
(1996)
Proc. Eleventh Annual Conf. on Computer Assurance (COMPASS '96)
, pp. 213-223
-
-
Lindqvist, U.1
Olovsson, T.2
Jonsson, E.3
-
10
-
-
0036930216
-
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems
-
H. V. Ramasamy, P. Pandey, J. Lyons, M. Cukier, and W. H. Sanders, "Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems," Proc. Intl Conf. on Dependable Sys. and Networks (DSN-2002), pp. 229-238, 2002
-
(2002)
Proc. Intl Conf. on Dependable Sys. and Networks (DSN-2002)
, pp. 229-238
-
-
Ramasamy, H.V.1
Pandey, P.2
Lyons, J.3
Cukier, M.4
Sanders, W.H.5
-
11
-
-
4243931532
-
Probabilistic Validation of Intrusion Tolerance
-
FastAbstract
-
W. H. Sanders, M. Cukier, F. Webber, P. Pal, and R. Watro, "Probabilistic Validation of Intrusion Tolerance," FastAbstract in Supplemental Volume of the 2002 International Conference on Dependable Systems and Networks, pp. B78-B79, 2002
-
(2002)
2002 International Conference on Dependable Systems and Networks
, vol.SUPPL. VOLUME
-
-
Sanders, W.H.1
Cukier, M.2
Webber, F.3
Pal, P.4
Watro, R.5
-
12
-
-
84944319215
-
Stochastic Activity Networks: Formal Definitions and Concepts
-
Lectures on Formal Methods and Performance Analysis, Springer-Verlag (E. Brinksma, H. Hermanns, J.P. Katoen, Ed.), Berlin
-
W. H. Sanders, and J. F. Meyer, "Stochastic Activity Networks: Formal Definitions and Concepts," In Lectures on Formal Methods and Performance Analysis, LNCS 2090, Springer-Verlag (E. Brinksma, H. Hermanns, J.P. Katoen, Ed.), Berlin, pp. 315-343, 2001
-
(2001)
LNCS
, vol.2090
, pp. 315-343
-
-
Sanders, W.H.1
Meyer, J.F.2
-
13
-
-
0025564050
-
Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial
-
F. Schneider, "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial," ACM Computing Surveys, Vol. 22, No. 4, pp. 299-319, 1990
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.1
-
14
-
-
35248840882
-
-
DARPA OASIS Program
-
Secure Computing Corporation, "Intrusion Tolerant Server Infrastructure," DARPA OASIS Program, http://www.tolerantsystems.org/ProjectSummaries/ Intrusion_Tolerant_Server_Infrastructure.html
-
Intrusion Tolerant Server Infrastructure
-
-
-
15
-
-
1542330099
-
Probabilistic Validation of an Intrusion-Tolerant Replication System
-
S. Singh, M. Cukier, and W. H. Sanders, "Probabilistic Validation of an Intrusion-Tolerant Replication System," Proc. Intl Conf. on Dependable Sys. and Networking (DSN-2003), pp. 615-624, 2003
-
(2003)
Proc. Intl Conf. on Dependable Sys. and Networking (DSN-2003)
, pp. 615-624
-
-
Singh, S.1
Cukier, M.2
Sanders, W.H.3
|