Sciweavers

15 search results - page 2 / 3
» Proactive Containment of Malice in Survivable Distributed Sy...
Sort
View
ER
2004
Springer
219views Database» more  ER 2004»
13 years 10 months ago
An Agent-Based Approach for Interleaved Composition and Execution of Web Services
The emerging paradigm of web services promises to bring to distributed computing the same flexibility that the web has brought to the publication and search of information contain...
Xiaocong Fan, Karthikeyan Umapathy, John Yen, Sand...
IADIS
2003
13 years 6 months ago
A Framework of High Confidence E-Healthcare Information System
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tsen...
COLCOM
2005
IEEE
13 years 10 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
IEEEARES
2008
IEEE
13 years 11 months ago
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks
— Access control concerns in MANETs are very serious and considered as a crucial challenge for operators who prospects to employ unrivaled capabilities of such networks for diffe...
Amir R. Khakpour, Maryline Laurent-Maknavicius, Ha...
PODC
1997
ACM
13 years 9 months ago
The Load and Availability of Byzantine Quorum Systems
Replicated services accessed via quorums enable each access to be performed at only a subset (quorum) of the servers and achieve consistency across accesses by requiring any two qu...
Dahlia Malkhi, Michael K. Reiter, Avishai Wool