Sciweavers

83 search results - page 7 / 17
» Implementing Trustworthy Services Using Replicated State Mac...
Sort
View
SOSP
2005
ACM
15 years 6 months ago
BAR fault tolerance for cooperative services
This paper describes a general approach to constructing cooperative services that span multiple administrative domains. In such environments, protocols must tolerate both Byzantin...
Amitanand S. Aiyer, Lorenzo Alvisi, Allen Clement,...
95
Voted
IWQOS
2011
Springer
14 years 13 days ago
Dexferizer: A service for data transfer optimization
— We present an approach to optimizing the transfer of data objects within a user’s collection of computers and personal devices, subject to a variety of user-defined quality ...
Ercan Ucan, Timothy Roscoe
ICDCS
2007
IEEE
15 years 3 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
FGCS
2011
115views more  FGCS 2011»
14 years 4 months ago
An approach for virtual appliance distribution for service deployment
Fulfilling a service request in highly dynamic service environments may require deploying a service. Therefore, the effectiveness of service deployment systems affects initial ...
Gabor Kecskemeti, Gábor Terstyánszky...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
14 years 6 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha