Logo do repositório
 
Publicação

How Practical Are Intrusion-Tolerant Distributed Systems?

dc.contributor.authorObelheiro, Rafael R.por
dc.contributor.authorBessani, Alysson Nevespor
dc.contributor.authorLung, Lau Cheukpor
dc.contributor.authorCorreia, Miguelpor
dc.date.accessioned2009-02-10T13:11:55Zpor
dc.date.accessioned2014-11-14T16:23:47Z
dc.date.available2009-02-10T13:11:55Zpor
dc.date.available2014-11-14T16:23:47Z
dc.date.issued2006-09por
dc.description.abstractBuilding secure, inviolable systems using traditional mechanisms is becoming increasingly an unattainable goal. The recognition of this fact has fostered the interest in alternative approaches to security such as intrusion tolerance, which applies fault tolerance concepts and techniques to security problems. Albeit this area is quite promising, intrusion-tolerant distributed systems typically rely on the assumption that the system components fail or are compromised independently. This is a strong assumption that has been repeatedly questioned. In this paper we discuss how this assumption can be implemented in practice using diversity of system components. We present a taxonomy of axes of diversity and discuss how they provide failure independence. Furthermore, we provide a practical example of an intrusion-tolerant system built using diversity.por
dc.identifier.urihttp://hdl.handle.net/10451/14093por
dc.identifier.urihttp://repositorio.ul.pt/handle/10455/2992por
dc.language.isoporpor
dc.publisherDepartment of Informatics, University of Lisbonpor
dc.relation.ispartofseriesdi-fcul-tr-06-15por
dc.subjectintrusion tolerancepor
dc.subjectdiversitypor
dc.subjectsecuritypor
dc.subjectfault tolerancepor
dc.titleHow Practical Are Intrusion-Tolerant Distributed Systems?por
dc.typereport
dspace.entity.typePublication
rcaap.rightsopenAccesspor
rcaap.typereportpor

Ficheiros

Principais
A mostrar 1 - 1 de 1
A carregar...
Miniatura
Nome:
06-15.pdf
Tamanho:
336.13 KB
Formato:
Adobe Portable Document Format