Sciweavers

SRDS
1993
IEEE
13 years 8 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
SRDS
1993
IEEE
13 years 8 months ago
Bayesian Analysis for Fault Location in Homogeneous Distributed Systems
We propose a simple and practical probabilistic comparison-based model, employing multiple incomplete test concepts, for handling fault location in distributed systems using a Bay...
Yu Lo Cyrus Chang, Leslie C. Lander, Horng-Shing L...
SRDS
1993
IEEE
13 years 8 months ago
A Secure Two Phase Locking Protocol
Rasikan David, Sang Hyuk Son
SRDS
1996
IEEE
13 years 8 months ago
Minimizing Timestamp Size for Completely Asynchronous Optimistic Recovery with Minimal Rollback
Basing rollback recovery on optimistic message logging and replay avoids the need for synchronization between processes during failure-free execution. Some previous research has a...
Sean W. Smith, David B. Johnson
SRDS
1996
IEEE
13 years 8 months ago
A Transparent Light-Weight Group Service
The virtual synchrony model for group communication has proven to be a powerful paradigm for building distributed applications. Implementationsof virtual synchrony usually require...
Luís Rodrigues, Katherine Guo, Antonio Sarg...
SRDS
1996
IEEE
13 years 8 months ago
Exploiting Data-Flow for Fault-Tolerance in a Wide-Area Parallel System
Wide-area parallel processing systems will soon be available to researchers to solve a range of problems. In these systems, it is certain that host failures and other faults will ...
Anh Nguyen-Tuong, Andrew S. Grimshaw, Mark Hyett
SRDS
1996
IEEE
13 years 8 months ago
Fail-Aware Failure Detectors
In existing asynchronous distributed systems it is impossible to implement failure detectors which are perfect, i.e. they only suspect crashed processes and eventually suspect all...
Christof Fetzer, Flaviu Cristian
SRDS
1997
IEEE
13 years 8 months ago
Software Approach to Hazard Detection Using On-line Analysis of Safety Constraints
Hazard situations in safety-critical systems are typically complex, so there is a need for means to detect complex hazards and react in a timely and meaningful way. This paper add...
Beth A. Schroeder, Karsten Schwan, Sudhir Aggarwal
SRDS
1997
IEEE
13 years 8 months ago
Availability Analysis of Transaction Processing Systems based on User-Perceived Performance
Transaction processing systems are judged by users to be correctly functioning not only if their transactions are executed correctly, but also if most of them are completed within...
Varsha Mainkar
SRDS
1997
IEEE
13 years 8 months ago
Comparing Operating Systems Using Robustness Benchmarks
When creating mission-critical distributed systems using off-the-shelf components, it is important to assess the dependability of not only the hardware, but the software as well. ...
Philip J. Koopman Jr., John Sung, Christopher P. D...