Survivability—a new technical and business perspective on security
Proceedings of the 1999 workshop on New security paradigms
Adaptive Management of an Active Service Network
BT Technology Journal
Survivability: Protecting Your Critical Systems
IEEE Internet Computing
Differentiated Quality of Service in Application Layer Active Networks
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
IWLCS '01 Revised Papers from the 4th International Workshop on Advances in Learning Classifier Systems
A Model for Mobile Code Using Interacting Automata
IEEE Transactions on Mobile Computing
A biological programming model for self-healing
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Composing simulation architectures for autonomic systems
The Knowledge Engineering Review
The ethics of designing artificial agents
Ethics and Information Technology
Using allopoietic agents in replicated software to respond to errors, faults, and attacks
Proceedings of the 48th Annual Southeast Regional Conference
A holistic approach to survivable distributed information system for critical applications
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Hi-index | 0.00 |
Traditional security approaches are not sufficient to deal with the protection and survivability of highly distributed information systems operating in unbounded networks. This paper discusses the need for and importance of survivability, defines unbounded network, and examines the characteristics that differentiate survivability from other software quality attributes and nonfunctional properties of systems. It introduces emergent algorithms as an approach to problem solving in unbounded networks and suggests a methodology for their development. Emergent algorithms are philosophically and methodologically different from traditional approaches. The characteristics of emergent algorithms are examined, a design strategy developed, and an example given for Internet routing. CERT is registered in the U.S. Patent & Trademark Office