메뉴 건너뛰기




Volumn 4, Issue 4, 2006, Pages 54-62

Intrusion-tolerant middleware

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED SOFTWARE; INTRUSION-TOLERANCE; MALICIOUS ATTACKS; MALICIOUS-AND ACCIDENTAL-FAULT TOLERANCE FOR INTERNET APPLICATIONS (MAFTIA);

EID: 33747276448     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2006.95     Document Type: Review
Times cited : (66)

References (15)
  • 1
    • 84881247246 scopus 로고    scopus 로고
    • Intrusion-tolerant architectures: Concepts and design
    • R. Lemos, C. Gacek, and A. Rornanovsky, eds., Springer-Verlag
    • P. Veríssimo, N.F. Neves, and M. Correia, "Intrusion-Tolerant Architectures: Concepts and Design," Architecting Dependable Systems, LNCS 2677, R. Lemos, C. Gacek, and A. Rornanovsky, eds., Springer-Verlag, 2003, pp. 3-36.
    • (2003) Architecting Dependable Systems, LNCS , vol.2677 , pp. 3-36
    • Veríssimo, P.1    Neves, N.F.2    Correia, M.3
  • 2
    • 4544355928 scopus 로고    scopus 로고
    • D. Powell and R.J. Stroud, eds., Project MAFTIA Deliverable D21, Jan.
    • D. Powell and R.J. Stroud, eds., Conceptual Model and Architecture of MAFTIA, Project MAFTIA Deliverable D21, Jan. 2003; www.maftia.org/maftia/ deliverables/D21.pdf.
    • (2003) Conceptual Model and Architecture of MAFTIA
  • 3
    • 4544263421 scopus 로고    scopus 로고
    • A qualitative analysis of the intrusion-tolerant capabilities of the MAFTIA architecture
    • R. Stroud et al., "A Qualitative Analysis of the Intrusion-Tolerant Capabilities of the MAFTIA Architecture," Proc. Int'l Conf. Dependable Systems and Networks (DSN 04), 2004, pp. 453-461.
    • (2004) Proc. Int'l Conf. Dependable Systems and Networks (DSN 04) , pp. 453-461
    • Stroud, R.1
  • 5
    • 4544292300 scopus 로고    scopus 로고
    • An intrusion-tolerant authorization scheme for internet applications
    • IEEE CS Press
    • Y. Deswarte et al., "An Intrusion-Tolerant Authorization Scheme for Internet Applications," Proc. Int'l Conf. Dependable Systems and Net works, IEEE CS Press, 2002, pp. C1.1-C1.6.
    • (2002) Proc. Int'l Conf. Dependable Systems and Net Works
    • Deswarte, Y.1
  • 6
    • 84858932650 scopus 로고    scopus 로고
    • Intrusion-tolerant middleware: The MAFTIA approach
    • Dept. of Informatics, Univ. of Lisbon, Nov.
    • P. Veríssimo et al., "Intrusion-Tolerant Middleware: The MAFTIA Approach," tech. report DI/FCUL TR 04-14, Dept. of Informatics, Univ. of Lisbon, Nov. 2004.
    • (2004) Tech. Report , vol.DI-FCUL TR 04-14
    • Veríssimo, P.1
  • 7
    • 35248864457 scopus 로고    scopus 로고
    • Uncertainty and predictability: Can they be reconciled?
    • Springer-Verlag
    • P. Verissimo, "Uncertainty and Predictability: Can They Be Reconciled?" Future Directions in Distributed Computing, LNCS 2584, Springer-Verlag, 2003, pp. 108-113.
    • (2003) Future Directions in Distributed Computing, LNCS , vol.2584 , pp. 108-113
    • Verissimo, P.1
  • 10
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty process
    • M.J. Fischer, N.A. Lynch, and M.S. Paterson, "Impossibility of Distributed Consensus with One Faulty Process," J. ACM, vol. 32, no. 2, 1985, pp. 374-382.
    • (1985) J. ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Paterson, M.S.3
  • 11
    • 0034500567 scopus 로고    scopus 로고
    • Random oracles in constantinople: Practical. asynchronous byzantine agreement using cryptography
    • ACM. Press
    • C. Cachin, K. Kursawe, and V. Shoup, "Random Oracles in Constantinople: Practical. Asynchronous Byzantine Agreement Using Cryptography," Proc. 19th ACM Symp. Principles of Distributed Computing, ACM. Press, 2000, pp. 123-132.
    • (2000) Proc. 19th ACM Symp. Principles of Distributed Computing , pp. 123-132
    • Cachin, C.1    Kursawe, K.2    Shoup, V.3
  • 12
    • 84880899710 scopus 로고    scopus 로고
    • Secure and efficient asynchronous broadcast protocols
    • J. Kilian, ed., Springer-Verlag
    • C. Cachin et al., "Secure and Efficient Asynchronous Broadcast Protocols," Advances in Cryptology, LNCS 2139, J. Kilian, ed., Springer-Verlag, 2001, pp. 524-541.
    • (2001) Advances in Cryptology, LNCS , vol.2139 , pp. 524-541
    • Cachin, C.1
  • 13
    • 17044416157 scopus 로고    scopus 로고
    • Low complexity byzantine-resilient consensus
    • M. Correia et al., "Low Complexity Byzantine-Resilient Consensus," Distributed Computing, vol. 17, no. 3, 2005, pp. 237-249.
    • (2005) Distributed Computing , vol.17 , Issue.3 , pp. 237-249
    • Correia, M.1
  • 14
    • 0036446289 scopus 로고    scopus 로고
    • Efficient byzantine-resilient reliable multicast on a hybrid failure model
    • IEEE CS Press
    • M. Correia et al., "Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model," Proc. 21st IEEE Symp. Reliable Distributed Systems, IEEE CS Press, 2002, pp. 2-11.
    • (2002) Proc. 21st IEEE Symp. Reliable Distributed Systems , pp. 2-11
    • Correia, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.