Sciweavers

6 search results - page 1 / 2
» On the Coverage of Proactive Security: An Addition to the Ta...
Sort
View
GI
2005
Springer
13 years 10 months ago
On the Coverage of Proactive Security: An Addition to the Taxonomy of Faults
: Intrusion tolerance is a recent approach to deal with intentional and malicious failures. It combines the research on fault tolerance with the research on security, and relies on...
Timo Warns
IFIP
2004
Springer
13 years 9 months ago
Dependability and its threats - A taxonomy
: This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, confidentiality...
Algirdas Avizienis, Jean-Claude Laprie, Brian Rand...
IJNSEC
2006
81views more  IJNSEC 2006»
13 years 4 months ago
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failu...
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
ICSM
2005
IEEE
13 years 10 months ago
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications
Automated cost-effective test strategies are needed to provide reliable, secure, and usable web applications. As a software maintainer updates an application, test cases must accu...
Sara Sprenkle, Sreedevi Sampath, Emily Gibson, Lor...
INFOCOM
2005
IEEE
13 years 10 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...