-
1
-
-
58049120018
-
PeerReview: Practical accountability for distributed systems
-
ACM New York, NY, USA
-
A. Haeberlen, P. Kouznetsov, and P. Druschel, "PeerReview: Practical accountability for distributed systems," Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, ACM New York, NY, USA, 2007, pp. 175-188.
-
(2007)
Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles
, pp. 175-188
-
-
Haeberlen, A.1
Kouznetsov, P.2
Druschel, P.3
-
2
-
-
41149122088
-
The role of accountability in dependable distributed systems
-
A.R. Yumerefendi and J.S. Chase, "The role of accountability in dependable distributed systems," Proceedings of H otDep, 2005.
-
(2005)
Proceedings of H OtDep
-
-
Yumerefendi, A.R.1
Chase, J.S.2
-
3
-
-
78649542345
-
-
ACM HotNets-VI
-
D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker, "Holding the Internet accountable," ACM HotNets-VI, 2007.
-
(2007)
Holding the Internet Accountable
-
-
Andersen, D.1
Balakrishnan, H.2
Feamster, N.3
Koponen, T.4
Moon, D.5
Shenker, S.6
-
4
-
-
65249188655
-
Accountable internet protocol (AIP)
-
ACM New York, NY, USA
-
D.G. Andersen, N. Feamster, T. Koponen, D. Moon, and S. Shenker, "Accountable internet protocol (AIP)," Proceedings of the ACM SIGCOMM 2008 conference on Data communication, ACM New York, NY, USA, 2008, pp. 339-350.
-
(2008)
Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication
, pp. 339-350
-
-
Andersen, D.G.1
Feamster, N.2
Koponen, T.3
Moon, D.4
Shenker, S.5
-
6
-
-
78649600314
-
-
http://peerreview.mpi-sws.org/
-
-
-
-
7
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease, The Byzantine generals problem, ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 4, 1982, pp. 382-401.
-
(1982)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.4
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
8
-
-
0030609303
-
End-to-end Internet packet dynamics
-
V. Paxson, End-to-end Internet packet dynamics, SIGCOMM Comput. Commun. Rev., vol. 27, 1997, pp. 139-152.
-
(1997)
SIGCOMM Comput. Commun. Rev.
, vol.27
, pp. 139-152
-
-
Paxson, V.1
-
9
-
-
0345757358
-
Practical Byzantine fault tolerance and proactive recovery
-
M. Castro and B. Liskov, Practical Byzantine fault tolerance and proactive recovery, ACM Trans. Comput. Syst.,vol. 20, 2002, pp. 398-461.
-
(2002)
ACM Trans. Comput. Syst.
, vol.20
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
10
-
-
84956700077
-
CSAR: A practical and provable technique to make randomized systems accountable
-
San Diego, CA, February
-
M. Backes, P. Druschel, A. Haeberlen, and D. Unruh, "CSAR: A practical and provable technique to make randomized systems accountable", Proceedings of the 16th Annual Network &Distributed System Security Symposium (NDSS '09), San Diego, CA, February 2009.
-
(2009)
Proceedings of the 16th Annual Network &distributed System Security Symposium (NDSS '09)
-
-
Backes, M.1
Druschel, P.2
Haeberlen, A.3
Unruh, D.4
-
12
-
-
73049090912
-
Incorporating accountability into internet email
-
W. Liu, S. Aggarwal, and Z. Duan, "Incorporating accountability into internet email," Proceedings of the 2009 ACM symposium on Applied Computing, 2009, pp. 875-882.
-
(2009)
Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 875-882
-
-
Liu, W.1
Aggarwal, S.2
Duan, Z.3
-
13
-
-
48349100653
-
Loss and delay accountability for the Internet
-
K. Argyraki, P. Maniatis, O. Irzak, S. Ashish, S. Shenker, and L. EPFL, "Loss and delay accountability for the Internet," IEEE International Conference on Network Protocols, 2007. ICNP 2007, 2007, pp. 194-205.
-
(2007)
IEEE International Conference on Network Protocols, 2007. ICNP 2007
, pp. 194-205
-
-
Argyraki, K.1
Maniatis, P.2
Irzak, O.3
Ashish, S.4
Shenker, S.5
Epfl, L.6
-
15
-
-
77951484135
-
Trust but verify: Accountability for network services
-
Leuven, Belgium: ACM
-
A.R. Yumerefendi and J.S. Chase, "Trust but verify: accountability for network services," Proceedings of the 11th workshop on ACM SIGOPS European workshop, Leuven, Belgium: ACM, 2004, p. 37.
-
(2004)
Proceedings of the 11th Workshop on ACM SIGOPS European Workshop
, pp. 37
-
-
Yumerefendi, A.R.1
Chase, J.S.2
-
17
-
-
78649626198
-
Re-ECN: The motivation for adding accountability for causing congestion to TCP/IP
-
Mar
-
Re-ECN: The Motivation for Adding Accountability for Causing Congestion to TCP/IP, Bob Briscoe (BT &UCL), Arnaud Jacquet, Toby Moncaster and Alan Smith (BT), IETF Internet-Draft (Mar 2009).
-
(2009)
IETF Internet-Draft
-
-
Briscoe, B.1
Jacquet, A.2
Moncaster, T.3
Smith, A.4
-
18
-
-
1042277255
-
A method for modeling and quantifying the security attributes ofintrusion tolerant systems
-
B.B. Madan, K. Goeva-Popstojanova, K. Vaidyanathan, and K.S. Trivedi, "A method for modeling and quantifying the security attributes ofintrusion tolerant systems," Performance Evaluation, vol. 56, 2004, pp. 167-186.
-
(2004)
Performance Evaluation
, vol.56
, pp. 167-186
-
-
Madan, B.B.1
Goeva-Popstojanova, K.2
Vaidyanathan, K.3
Trivedi, K.S.4
-
19
-
-
49049102990
-
Quantitative assessment of enterprise security system
-
R. Breu, F. Innerhofer-Oberperfler, and A. Yautsiukhin, "Quantitative assessment of enterprise security system," Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, 2008, pp. 921-928.
-
(2008)
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on
, pp. 921-928
-
-
Breu, R.1
Innerhofer-Oberperfler, F.2
Yautsiukhin, A.3
-
20
-
-
36949002032
-
A game-theoretic approach to stochastic security and dependability evaluation
-
DOI 10.1109/DASC.2006.7c, 4030867, Proceedings - 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
-
K. Sallhammar, B. Helvik, and S. Knapskog, "A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation," Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on, 2006, pp. 61-68. (Pubitemid 350237444)
-
(2006)
Proceedings - 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006
, pp. 61-68
-
-
Sallhammar, K.1
Helvik, B.E.2
Knapskog, S.J.3
-
21
-
-
0003969633
-
-
Department of Defense, Technical Report 5200.28-STD, Department of Defense
-
Department of Defense. Trusted Computer System Evaluation Criteria. Technical Report 5200.28-STD, Department of Defense, 1985.
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
22
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Sept./Oct
-
Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
23
-
-
42649088128
-
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
-
Apr
-
Y. Xiao, "Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks," IEEE Communication Magazine, Vol. 46, No. 4, Apr. 2008, pp. 116-126.
-
(2008)
IEEE Communication Magazine
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
25
-
-
77953884604
-
P-accountable networked systems
-
Work in Progress (WIP) Track;
-
Z. Xiao and Y. Xiao, "P-Accountable Networked Systems," Proceeding of INFOCOM 2010, Work in Progress (WIP) Track;
-
Proceeding of INFOCOM 2010
-
-
Xiao, Z.1
Xiao, Y.2
|