Large classes of autonomic (self-managing, selfhealing) systems can be created by logically integrating simpler autonomic systems. The configuration method is widely used for such...
Sanjai Narain, Thanh Cheng, Brian A. Coan, Vikram ...
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
If multicast communication appears as the most efficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as...
Abstract. Shopbots are agents that search the Internet for information pertaining to the price and quality of goods or services. With the advent of shopbots, a dramatic reduction i...
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...