Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Enabling conferencing applications on the internet using an overlay muilticast architecture
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Active Networks and Active Network Management: A Proactive Management Framework
Active Networks and Active Network Management: A Proactive Management Framework
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Content Distribution Networks: An Engineering Approach
Content Distribution Networks: An Engineering Approach
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Proceedings of the 10th ACM conference on Computer and communications security
SRIRAM: A scalable resilient autonomic mesh
IBM Systems Journal
Analysis of techniques for building intrusion tolerant server systems
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 0.00 |
The paper offers tree-structured connectivity between the peer entities over an infrastructure network as an abstraction to embody the application-oriented processing functions on peer-to-peer information flows. Tree reconfigurations are triggered when failures or security violations occur in the connectivity path between the peer nodes (e.g., increase in path delays, DOS attack on a node). Reconfigurations are also initiated when the application-level properties of information flows change (e.g., lower data accuracy for non-important contents). For Information Assurance settings, a tree structure elegantly supports the desired properties of separation and non-inference between the low-level network entities and the application entities. A connectivity management algorithm reconfigures a tree satisfying the desired topological properties (e.g., low geographic spread, low peer-to-peer distances). The algorithm provides redundancy in the connectivity paths along the temporal dimension (on top of a rich connectivity in the physical infrastructure -- as in overlay networks). Application case studies of tree-structured connectivity with QoS and security goals are also described.