IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Congestion avoidance and control
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
An Adaptive Algorithm to Ensure Differential Service in a Token-Ring Network
IEEE Transactions on Computers
The X-Kernel: An Architecture for Implementing Network Protocols
IEEE Transactions on Software Engineering
CRYPTO '89 Proceedings on Advances in cryptology
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Adapting to network and client variability via on-demand dynamic distillation
Proceedings of the seventh international conference on Architectural support for programming languages and operating systems
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
A Configurable Membership Service
IEEE Transactions on Computers
Building adaptive systems using ensemble
Software—Practice & Experience - Special issue on multiprocessor operating systems
Coyote: a system for constructing fine-grain configurable communication services
ACM Transactions on Computer Systems (TOCS)
Real-Time Dependable Channels: Customizing QoS Attributes for Distributed Systems
IEEE Transactions on Parallel and Distributed Systems
On the security of multiple encryption
Communications of the ACM
Survivability analysis of networked systems
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
EDCC-1 Proceedings of the First European Dependable Computing Conference on Dependable Computing
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Experience with EMERALD to Date
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
The Architecture and Performance of Security Protocols in the Ensemble Group Communication System
The Architecture and Performance of Security Protocols in the Ensemble Group Communication System
Constructing Adaptive Software in Distributed Systems
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
Constructing a configurable group RPC service
ICDCS '95 Proceedings of the 15th International Conference on Distributed Computing Systems
Antigone: a flexible framework for secure group communication
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A java beans component architecture for cryptographic protocols
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Intrusion-Tolerant Server Architecture for Survivable Services
The Journal of Supercomputing
Dual-Homing Based Scalable Partia Multicast Protection
IEEE Transactions on Computers
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Architecting Dependable Systems III
Distributed control for the networks of adaptive software components
Information Systems Frontiers
Performance troubleshooting in data centers: an annotated bibliography?
ACM SIGOPS Operating Systems Review
Hi-index | 14.98 |
Survivable systems驴that is, systems that can continue to provide service despite failures, intrusions, and other threats驴are increasingly needed in a wide variety of civilian and military application areas. As a step toward realizing such systems, this paper advocates the use of redundancy and adaptation to build survivable services that can provide core functionality for implementing survivability in networked environments. An approach to building such services using these techniques is described and a concrete example involving a survivable communication service is given. This service is based on Cactus, a system for building highly configurable network protocols that offers the flexibility needed to easily add redundant and adaptive components. Initial performance results for a prototype implementation of the communication service built using Cactus/C 2.1 running on Linux are also given.