메뉴 건너뛰기




Volumn , Issue , 2011, Pages 15-18

From Byzantine fault tolerance to intrusion tolerance (a position paper)

Author keywords

Byzantine Fault Tolerance; Intrusion Tolerance

Indexed keywords

BYZANTINE FAULT TOLERANCE; COMPLETE SOLUTIONS; FAULT-TOLERANT; INTRUSION TOLERANCE; INTRUSION-TOLERANT SYSTEMS; MALICIOUS ADVERSARIES; OPEN PROBLEMS; POSITION PAPERS; SECURITY PROPERTIES;

EID: 80052157228     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSNW.2011.5958857     Document Type: Conference Paper
Times cited : (14)

References (26)
  • 2
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine Fault Tolerance and Proactive Recovery
    • DOI 10.1145/571637.571640
    • M. Castro and B. Liskov, "Practical Byzantine fault-tolerance and proactive recovery," ACM TOCS, vol. 20, no. 4, pp. 398- 461, 2002. (Pubitemid 135702591)
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 4
    • 80051526094 scopus 로고    scopus 로고
    • A comparison of intrusion-tolerant system architectures
    • Mar./Apr.
    • Q. Nguyen and A. Sood, "A comparison of intrusion-tolerant system architectures," IEEE Security & Privacy, vol. 9, no. 2, pp. 18-25, Mar./Apr. 2003.
    • (2003) IEEE Security & Privacy , vol.9 , Issue.2 , pp. 18-25
    • Nguyen, Q.1    Sood, A.2
  • 8
    • 16244410458 scopus 로고    scopus 로고
    • How to tolerate half less one byzantine nodes in practical distributed systems
    • Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, SRDS 2004
    • M. Correia, N. F. Neves, and P. Veríssimo, "How to tolerate half less one Byzantine nodes in practical distributed systems," in Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems, Oct. 2004, pp. 174-183. (Pubitemid 40449363)
    • (2004) Proceedings of the IEEE Symposium on Reliable Distributed Systems , pp. 174-183
    • Correia, M.1    Neves, N.F.2    Verissimo, P.3
  • 11
    • 0345757359 scopus 로고    scopus 로고
    • COCA: A Secure Distributed Online Certification Authority
    • DOI 10.1145/571637.571638
    • L. Zhou, F. Schneider, and R. Van Rennesse, "COCA: A secure distributed online certification authority," ACM TOCS, vol. 20, no. 4, pp. 329-368, Nov. 2002. (Pubitemid 135702589)
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4 , pp. 329-368
    • Zhou, L.1    Schneider, F.B.2    Van Renesse, R.3
  • 15
    • 0017792448 scopus 로고
    • On the implementation of Nversion programming for software fault tolerance during execution
    • Chicago, IL, USA, Nov.
    • A. Avizienis and L. Chen, "On the implementation of Nversion programming for software fault tolerance during execution," in Proceedings of the IEEE COMPSAC, Chicago, IL, USA, Nov. 1977, pp. 149-155.
    • (1977) Proceedings of the IEEE COMPSAC , pp. 149-155
    • Avizienis, A.1    Chen, L.2
  • 17
    • 36248952641 scopus 로고    scopus 로고
    • Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers
    • DOI 10.1109/TDSC.2007.70208
    • I. Gashi, P. Popov, and L. Strigini, "Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 280-294, Oct-Dec 2007. (Pubitemid 350125894)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 280-294
    • Gashi, I.1    Popov, P.2    Strigini, L.3
  • 23
    • 2442619381 scopus 로고    scopus 로고
    • BASE: Using abstraction to improve fault tolerance
    • Aug.
    • M. Castro, R. Rodrigues, and B. Liskov, "BASE: Using abstraction to improve fault tolerance," ACM Transactions Computer Systems, vol. 21, no. 3, pp. 236-269, Aug. 2003.
    • (2003) ACM Transactions Computer Systems , vol.21 , Issue.3 , pp. 236-269
    • Castro, M.1    Rodrigues, R.2    Liskov, B.3
  • 25
    • 12344279229 scopus 로고    scopus 로고
    • CODEX: A robust and secure secret distribution system
    • DOI 10.1109/TDSC.2004.3
    • M. A. Marsh and F. B. Schneider, "CODEX: A robust and secure secret distribution system," IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 34-47, Jan.-Mar. 2004. (Pubitemid 40134577)
    • (2004) IEEE Transactions on Dependable and Secure Computing , vol.1 , Issue.1 , pp. 34-47
    • Marsh, M.A.1    Schneider, F.B.2
  • 26
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • March
    • C. Gentry, "Computing arbitrary functions of encrypted data," Communications of the ACM, vol. 53, pp. 97-105, March 2010.
    • (2010) Communications of the ACM , vol.53 , pp. 97-105
    • Gentry, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.