-
1
-
-
0007803468
-
WAFT: Support for Fault-Tolerance in Wide-Area Object Oriented Systems
-
IEEE Computer Society Press, Los Alamitos, CA, October
-
Alvisi, L. and K. Marzullo. "WAFT: Support for Fault-Tolerance in Wide-Area Object Oriented Systems." Proc. 2nd Information Survivability Workshop, IEEE Computer Society Press, Los Alamitos, CA, October 1998.
-
(1998)
Proc. 2nd Information Survivability Workshop
-
-
Alvisi, L.1
Marzullo, K.2
-
2
-
-
0017913718
-
Safe programming
-
Anderson, T., and R. W. Witty. "Safe programming." BIT 18:1-8, 1978.
-
(1978)
BIT
, vol.18
, pp. 1-8
-
-
Anderson, T.1
Witty, R.W.2
-
4
-
-
5044238949
-
Fundamental Concepts of Computer System Dependability
-
Seoul, Korea, May
-
Avizienis, A., J. Laprie, and B. Randell. "Fundamental Concepts of Computer System Dependability." IARP/IEEE-RAS Workshop on Robot Dependability: Technological Challenge of Dependable Robots in Human Environments, Seoul, Korea, May 2001.
-
(2001)
IARP/IEEE-RAS Workshop on Robot Dependability: Technological Challenge of Dependable Robots in Human Environments
-
-
Avizienis, A.1
Laprie, J.2
Randell, B.3
-
5
-
-
0012242179
-
On Group Communication in Large-Scale Distributed Systems
-
January
-
Babaoglu, O. and A. Schiper. "On Group Communication in Large-Scale Distributed Systems." ACM Operating Systems Review 29(1):62-67, January 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.1
, pp. 62-67
-
-
Babaoglu, O.1
Schiper, A.2
-
6
-
-
1542288257
-
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries
-
San Francisco CA, June
-
Backes, M. and C. Cachin. "Reliable Broadcast In A Computational Hybrid Model With Byzantine Faults, Crashes, And Recoveries" International Conference on Dependable Systems and Networks, San Francisco CA, June 2003
-
(2003)
International Conference on Dependable Systems and Networks
-
-
Backes, M.1
Cachin, C.2
-
7
-
-
0027810202
-
The Process Group Approach to Reliable Distributed Computing
-
December
-
Birman, K. "The Process Group Approach to Reliable Distributed Computing." Communications of the ACM, 36(12):37-53 and 103, December 1993.
-
(1993)
Communications of the ACM
, vol.36
, Issue.12
, pp. 37-53
-
-
Birman, K.1
-
8
-
-
0029214107
-
Safety Kernels: Specification and Implementation
-
Burns, A., and A. J. Wellings. "Safety Kernels: Specification and Implementation." High Integrity Systems 1(3):287-300, 1995.
-
(1995)
High Integrity Systems
, vol.1
, Issue.3
, pp. 287-300
-
-
Burns, A.1
Wellings, A.J.2
-
10
-
-
0026104130
-
Understanding Fault-Tolerant Distributed Systems
-
February
-
Cristian, F. "Understanding Fault-Tolerant Distributed Systems." Communications of the ACM 34(2):56-78, February 1991.
-
(1991)
Communications of the ACM
, vol.34
, Issue.2
, pp. 56-78
-
-
Cristian, F.1
-
11
-
-
4544292300
-
An Intrusion-Tolerant Authorization Scheme for Internet Applications
-
Washington, D.C. June
-
Deswarte, Y., N. Abghour, V. Nicomette, D. Powell. "An Intrusion-Tolerant Authorization Scheme for Internet Applications." Sup. to Proc. 2002 International Conference on Dependable Systems and Networks, Washington, D.C. June 2002.
-
(2002)
Sup. to Proc. 2002 International Conference on Dependable Systems and Networks
-
-
Deswarte, Y.1
Abghour, N.2
Nicomette, V.3
Powell, D.4
-
13
-
-
0003449736
-
Survivable Network Systems: An Emerging Discipline
-
Software Engineering Institute, Carnegie Mellon University, November
-
Ellison, B., D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead. "Survivable Network Systems: An Emerging Discipline." Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, November 1997.
-
(1997)
Technical Report CMU/SEI-97-TR-013
-
-
Ellison, B.1
Fisher, D.2
Linger, R.3
Lipson, H.4
Longstaff, T.5
Mead, N.6
-
14
-
-
0011998335
-
-
Federal Aviation Administration Advisory Circular 25.1309-1A
-
Federal Aviation Administration Advisory Circular 25.1309-1A, "System Design and Analysis."
-
System Design and Analysis
-
-
-
16
-
-
0345415768
-
Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous Environments
-
March
-
Gartner, Felix C. "Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous Environments." A CM Computing Surveys 31(1):1-26, March 1999.
-
(1999)
A CM Computing Surveys
, vol.31
, Issue.1
, pp. 1-26
-
-
Gartner Felix, C.1
-
18
-
-
4243454421
-
Summaries of Four Critical Infrastructure Systems
-
Department of Computer Science, University of Virginia, November
-
Knight, J., M. Elder, J. Flinn, and P. Marx. "Summaries of Four Critical Infrastructure Systems." Technical Report CS-97-27, Department of Computer Science, University of Virginia, November 1997.
-
(1997)
Technical Report CS-97-27
-
-
Knight, J.1
Elder, M.2
Flinn, J.3
Marx, P.4
-
19
-
-
3142707659
-
The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications
-
Washington, DC, June
-
Knight, J. C., D. Heimbigner, A. Wolf, A. Carzaniga, J. Hill, P. Devanbu, and M. Gertz. "The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications." Intrusion Tolerance Workshop, The International Conference on Dependable Systems and Networks, Washington, DC, June 2002.
-
(2002)
Intrusion Tolerance Workshop, the International Conference on Dependable Systems and Networks
-
-
Knight, J.C.1
Heimbigner, D.2
Wolf, A.3
Carzaniga, A.4
Hill, J.5
Devanbu, P.6
Gertz, M.7
-
20
-
-
84942246436
-
Towards a Rigorous Definition of Information System Survivability
-
Washington, DC, April
-
Knight, J. C., E. A. Strunk and K. J. Sullivan. "Towards a Rigorous Definition of Information System Survivability." DISCEX 2003, Washington, DC, April 2003.
-
(2003)
DISCEX 2003
-
-
Knight, J.C.1
Strunk, E.A.2
Sullivan, K.J.3
-
22
-
-
0020632968
-
Design for Safe Software
-
Reno, Nevada
-
Leveson, N., T. Shimeall, J. Stolzy and J. Thomas. "Design for Safe Software." AIAA Space Sciences Meeting, Reno, Nevada, 1983.
-
(1983)
AIAA Space Sciences Meeting
-
-
Leveson, N.1
Shimeall, T.2
Stolzy, J.3
Thomas, J.4
-
23
-
-
0002856604
-
Structuring Parallel and Distributed Programs
-
March
-
Magee, J., N. Dulay and J. Kramer. "Structuring Parallel and Distributed Programs." Software Engineering Journal, 8(2):73-82, March 1993.
-
(1993)
Software Engineering Journal
, vol.8
, Issue.2
, pp. 73-82
-
-
Magee, J.1
Dulay, N.2
Kramer, J.3
-
25
-
-
0032025572
-
Surviving Network Partitioning
-
March
-
Melliar-Smith, P., and L. Moser. "Surviving Network Partitioning." IEEE Computer 31(3):62-68, March 1998.
-
(1998)
IEEE Computer
, vol.31
, Issue.3
, pp. 62-68
-
-
Melliar-Smith, P.1
Moser, L.2
-
26
-
-
0019047765
-
On Evaluating the Performability of Degradable Computing Systems
-
August
-
Myers, J.F. "On Evaluating The Performability Of Degradable Computing Systems." IEEE Transactions on Computers 29(8):720-731, August 1980.
-
(1980)
IEEE Transactions on Computers
, vol.29
, Issue.8
, pp. 720-731
-
-
Myers, J.F.1
-
28
-
-
33845665127
-
A Product Family Based Approach to Graceful Degradation
-
Paderborn, Germany, October
-
Nace, W., and P. Koopman. "A Product Family Based Approach to Graceful Degradation." DIPES 2000, Paderborn, Germany, October 2000.
-
(2000)
DIPES 2000
-
-
Nace, W.1
Koopman, P.2
-
29
-
-
0036472463
-
Requirements-based Monitors for Real-time Systems
-
Feb.
-
Peters, D. K., and D. L. Parnas. "Requirements-based Monitors for Real-time Systems." IEEE Trans. on Software Engineering 28(2):146-158, Feb. 2002.
-
(2002)
IEEE Trans. on Software Engineering
, vol.28
, Issue.2
, pp. 146-158
-
-
Peters, D.K.1
Parnas, D.L.2
-
31
-
-
84946219328
-
Quantifying the Cost of Providing Intrusion Tolerance in Group Communications
-
(J. Lala Ed.), IEEE Computer Society Press
-
Ramasamy, H., P. Pandey, J. Lyons, M. Cukier, and W. Sanders. "Quantifying the Cost of Providing Intrusion Tolerance in Group Communications." in OASIS: Foundations of Intrusion Tolerant Systems (J. Lala Ed.), IEEE Computer Society Press, 2003.
-
(2003)
OASIS: Foundations of Intrusion Tolerant Systems
-
-
Ramasamy, H.1
Pandey, P.2
Lyons, J.3
Cukier, M.4
Sanders, W.5
-
32
-
-
22944446325
-
The Design and Implementation of an Intrusion Tolerant System
-
(J. Lala Ed.), IEEE Computer Society Press
-
Reynolds, J., J. Just, E. Lawson, L. Clough, R. Maglich, and K. Levitt. "The Design and Implementation of an Intrusion Tolerant System." in OASIS: Foundations of Intrusion Tolerant Systems (J. Lala Ed.), IEEE Computer Society Press, 2003.
-
(2003)
OASIS: Foundations of Intrusion Tolerant Systems
-
-
Reynolds, J.1
Just, J.2
Lawson, E.3
Clough, L.4
Maglich, R.5
Levitt, K.6
-
33
-
-
4544282180
-
Efficient Hierarchic Management for Reconfiguration of Networked Information Systems
-
Florence, Italy, June
-
Rowanhill, Jonathan C., Philip E. Varner and John C. Knight. "Efficient Hierarchic Management For Reconfiguration of Networked Information Systems." The International Conference on Dependable Systems and Networks (DSN-2004), Florence, Italy, June 2004.
-
(2004)
The International Conference on Dependable Systems and Networks (DSN-2004)
-
-
Rowanhill Jonathan, C.1
Varner, P.E.2
Knight, J.C.3
-
34
-
-
0012297608
-
Kernels for Safety?
-
T. Anderson Ed., Blackwell Scientific Publications
-
Rushby, J. "Kernels for Safety?" Safe and Secure Computing Systems, T. Anderson Ed., Blackwell Scientific Publications, 1989.
-
(1989)
Safe and Secure Computing Systems
-
-
Rushby, J.1
-
35
-
-
84946225120
-
Developing a Heterogeneous Intrusion Tolerant CORBA Systems
-
(J. Lala Ed.), IEEE Computer Society Press
-
Sames, D., B. Matt, B. Niebuhr, G. Tally, B. Whitmore, and D. Bakken. "Developing a Heterogeneous Intrusion Tolerant CORBA Systems." in OASIS: Foundations of Intrusion Tolerant Systems (J. Lala Ed.), IEEE Computer Society Press, 2003.
-
(2003)
OASIS: Foundations of Intrusion Tolerant Systems
-
-
Sames, D.1
Matt, B.2
Niebuhr, B.3
Tally, G.4
Whitmore, B.5
Bakken, D.6
-
36
-
-
35048870151
-
An Automated Defense System to Counter Internet Worms
-
Department of Computer Science, University of Virginia, March
-
Scandariato, Riccardo and John C. Knight. "An Automated Defense System to Counter Internet Worms." Technical Report CS-2004-12, Department of Computer Science, University of Virginia, March 2004.
-
(2004)
Technical Report CS-2004-12
-
-
Scandariato, R.1
Knight, J.C.2
-
37
-
-
84976815497
-
Fail-stop processors: An approach to designing fault-tolerant computing systems
-
Schlichting, R. D., and F. B. Schneider. "Fail-stop processors: An approach to designing fault-tolerant computing systems." ACM Transactions on Computing Systems 1(3):222-238.
-
ACM Transactions on Computing Systems
, vol.1
, Issue.3
, pp. 222-238
-
-
Schlichting, R.D.1
Schneider, F.B.2
-
38
-
-
0035394327
-
Using Simplicity to Control Complexity
-
Sha, L. "Using Simplicity to Control Complexity." IEEE Software 18(4):20-28, 2001.
-
(2001)
IEEE Software
, vol.18
, Issue.4
, pp. 20-28
-
-
Sha, L.1
-
39
-
-
0004911634
-
A Software Architecture for Dependable and Evolvable Industrial Computing Systems
-
Software Engineering Institute, Carnegie Mellon University
-
Sha, L., R. Rajkumar and M. Gagliardi. "A Software Architecture for Dependable and Evolvable Industrial Computing Systems." Technical Report CMU/SEI-95-TR-005, Software Engineering Institute, Carnegie Mellon University, 1995.
-
(1995)
Technical Report CMU/SEI-95-TR-005
-
-
Sha, L.1
Rajkumar, R.2
Gagliardi, M.3
-
40
-
-
84883065773
-
A framework for scalable analysis and design of system-wide graceful degradation in distributed embedded systems
-
Guadelajara, Mexico, January
-
Shelton, C., P. Koopman, and W. Nace. "A framework for scalable analysis and design of system-wide graceful degradation in distributed embedded systems." Eighth IEEE International Workshop on Object-oriented Real-time Dependable Systems, Guadelajara, Mexico, January 2003.
-
(2003)
Eighth IEEE International Workshop on Object-oriented Real-time Dependable Systems
-
-
Shelton, C.1
Koopman, P.2
Nace, W.3
-
44
-
-
84863559791
-
Self Securing Storage: Protecting Data in Compromised Systems
-
(J. Lala Ed.), IEEE Computer Society Press
-
Strunk, J., G. Goodson, M. Scheinholz, C. Soules and G Ganger. "Self Securing Storage: Protecting Data in Compromised Systems." in OASIS: Foundations of Intrusion Tolerant Systems (J. Lala Ed.), IEEE Computer Society Press, 2003.
-
(2003)
OASIS: Foundations of Intrusion Tolerant Systems
-
-
Strunk, J.1
Goodson, G.2
Scheinholz, M.3
Soules, C.4
Ganger, G.5
-
45
-
-
0032659984
-
Information Survivability Control Systems
-
IEEE Computer Society Press, Los Alamitos, CA, May
-
Sullivan, K., J. Knight, X. Du, and S. Geist. "Information Survivability Control Systems." Proc. 21st International Conference on Software Engineering, IEEE Computer Society Press, Los Alamitos, CA, May 1999.
-
(1999)
Proc. 21st International Conference on Software Engineering
-
-
Sullivan, K.1
Knight, J.2
Du, X.3
Geist, S.4
-
46
-
-
35048826249
-
-
U.S. Department of Commerce, National Telecommunications and Information Administration, Institute for Telecommunications Services, Federal Std. 1037C
-
U.S. Department of Commerce, National Telecommunications and Information Administration, Institute for Telecommunications Services, Federal Std. 1037C.
-
-
-
-
48
-
-
0030130161
-
Horus: A Flexible Group Communications System
-
April
-
van Renesse, R., K. Birman, and S. Maffeis. "Horus: A Flexible Group Communications System." Comm. of the ACM 39(4):76-83, April 1996.
-
(1996)
Comm. of the ACM
, vol.39
, Issue.4
, pp. 76-83
-
-
Van Renesse, R.1
Birman, K.2
Maffeis, S.3
-
49
-
-
0003544795
-
Building Adaptive Systems Using Ensemble
-
Department of Computer Science, Cornell University, July
-
van Renesse, R., K. Birman, M. Hayden, A. Vaysburd, and D. Karr. "Building Adaptive Systems Using Ensemble." Technical Report TR97-1638, Department of Computer Science, Cornell University, July 1997.
-
(1997)
Technical Report TR97-1638
-
-
Van Renesse, R.1
Birman, K.2
Hayden, M.3
Vaysburd, A.4
Karr, D.5
-
50
-
-
33746780102
-
Astrolabe: A Robust and Scalable Technology for Distributed System Monitoring, Management, and Data Mining
-
May
-
Van Renesse, R., K. Birman and W. Vogels. "Astrolabe: A Robust and Scalable Technology for Distributed System Monitoring, Management, and Data Mining." ACM Transactions on Computer Systems, Vol. 21, No. 2, pp. 164-206, May 2003.
-
(2003)
ACM Transactions on Computer Systems
, vol.21
, Issue.2
, pp. 164-206
-
-
Van Renesse, R.1
Birman, K.2
Vogels, W.3
-
51
-
-
33748697823
-
Intrusion-Tolerant Architectures: Concepts and Design (extended)
-
Department of Computer Science, University of Lisboa
-
Veríssimo, P., Neves, N.F., and Correia, M. "Intrusion-Tolerant Architectures: Concepts and Design (extended)." Technical Report DI/FCUL TR03-5, Department of Computer Science, University of Lisboa, 2003
-
(2003)
Technical Report DI/FCUL TR03-5
-
-
Veríssimo, P.1
Neves, N.F.2
Correia, M.3
-
52
-
-
84946228500
-
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services
-
(J. Lala Ed.), IEEE Computer Society Press
-
Wang, F., F. Jou, F. Gong, C. Sargor, K. Goseva-Popstojanova, and K. Trivedi. "SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services." in OASIS: Foundations of Intrusion Tolerant Systems (J. Lala Ed.), IEEE Computer Society Press, 2003.
-
(2003)
OASIS: Foundations of Intrusion Tolerant Systems
-
-
Wang, F.1
Jou, F.2
Gong, F.3
Sargor, C.4
Goseva-Popstojanova, K.5
Trivedi, K.6
|