A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Asynchronous intrusion recovery for interconnected web services
2013
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles - SOSP '13
This paper presents Aire, an intrusion recovery system for such web services. ...
Web services are an important example of an interconnected system, as they are increasingly using protocols such as OAuth and REST APIs to integrate with one another. ...
Acknowledgments We thank Frans Kaashoek, Eddie Kohler, the anonymous reviewers, and our shepherd, Michael Walfish, for their help and feedback. ...
doi:10.1145/2517349.2522725
dblp:conf/sosp/ChandraKZ13
fatcat:yqdx7nfh4jfrbe2gvbpg46ncfq
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture
[chapter]
2006
Lecture Notes in Computer Science
The largely computerised nature of critical infrastructures and the pervasive interconnection of systems all over the world have generated the problem of achieving resilience of critical information infrastructures ...
paper focuses on the computer systems behind electrical utility infrastructures, and proposes the blueprint of a distributed systems architecture that we believe may come to be useful as a reference for ...
Malicious-and Accidental-Fault Tolerance for Internet Applications. The web site of the project is at www.maftia.org.
Virtual LANs ...
doi:10.1007/11962977_1
fatcat:icn65da2qjhhbpujn5ekj4irti
The CRUTIAL reference critical information infrastructure architecture: a blueprint
2008
International Journal of System of Systems Engineering
Critical infrastructures have evolved over the past decades to become largely computerised and interconnected all over the world. ...
It proposes the blueprint of a distributed systems architecture that we believe may come to be useful as a reference for modern CII in general. ...
We warmly thank our partners in the project for many discussions on the topics of this paper. ...
doi:10.1504/ijsse.2008.018132
fatcat:74mwshex5nhhpp5sloqoyo2wii
The CRUTIAL Architecture for Critical Information Infrastructures
[chapter]
2008
Lecture Notes in Computer Science
(ii) Middleware devices that achieve runtime automatic tolerance of remaining faults and intrusions, supplying trusted services out of non-trustworthy components. ...
Then, the Protection Strategies and Services are introduced in Section 3, followed by the Trustworthiness Monitoring Services in Section 4. ...
We warmly thank our partners at the project for many discussions on the topics of the chapter. ...
doi:10.1007/978-3-540-85571-2_1
fatcat:zym7eqqe4zb2fnm3vbrkeiaq5i
A Survey on Security Mechanisms of Leading Cloud Service Providers
2014
International Journal of Computer Applications
Clouding Computing is a virtual pool of resources provided to users as service through a web interface. These resources may include Software, Infrastructure, Storage, Network, Platform etc. ...
With an unprecedented pace of developments in Cloud computing technology, there has been an exponential increase of users of these services and an equal rise of cloud services providers. ...
Audit Logging, Intrusion Detection, LDAP and Active Directory [6], Traffic Screening and Surveillance [9]. ...
doi:10.5120/17149-7184
fatcat:262geqqsqbet7gofec7wyrn2di
State of Art Survey for Fault Tolerance Feasibility in Distributed Systems
2021
Asian Journal of Research in Computer Science
The use of technology has grown dramatically, and computer systems are now interconnected via various communication mediums. ...
tolerance (FT) techniques in distributed systems to ensure replication, high redundancy, and high availability of distributed services. ...
A state of art survey for web server performance Eesa AS. Optimization algorithms for intrusion detection system: A review, International Journal of Research-Granthaalayah. 2020;8:217-225. 56. ...
doi:10.9734/ajrcos/2021/v11i430268
fatcat:asp5rhd3lvdgrkyvprmgqcoyoq
Infrastructure Web
[chapter]
2004
Statistics: A Series of Textbooks and Monographs
To this end, we have designed an underlying web-like architecture that will serve as a platform for the decentralized monitoring and management of national critical infrastructures. ...
(health, law enforcement, emergency management) and commerce (financial services, logistics). ...
UDDI is also a framework for Web services integration that contains specifications for service description and discovery. ...
doi:10.1201/9781420030884.ch17
fatcat:nefc36t5wvaa7ezgdstbr2c5bi
Non-intrusive QoS monitoring and analysis for self-healing web services
2008
2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)
Monitoring and analysis of QoS are crucial steps for the provisioning of self-healing web services and for managing web service-based distributed interactive applications. ...
This framework has been implemented and experimented for the web service technology within the European WS-DIAMOND 1 project. ...
The Repair web service asked for recovery, substitutes Shop1 by Shop2 in a seamless way to the requester and the provider. ...
doi:10.1109/icadiwt.2008.4664408
fatcat:jzi64jmjrvfr3amgatl4kiayri
A Review Paper on Secure Virtualization for Cloud Computing
2022
International Journal of Innovative Research in Engineering & Management
In specifically, we present the Advanced-Cloud-Protection-System (ACPS), a new construction targeted at ensuring improved security for cloud resources. ...
added assaults. SEI5-Recovery: In the event of a catastrophe, the cloud provider must offer an operative duplication and repossession method to restore-services. SEI6 Accountability: notwithstanding ...
INTRODUCTION The Internet is also about to enter a new era, wherein resources are internationally interconnected and easily transferred [1] . ...
doi:10.55524/ijirem.2022.9.1.103
fatcat:tnfpmoy4d5g6fcylmlftp6bjeq
Talking After Lights Out: An Ad Hoc Network for Electric Grid Recovery
[article]
2021
arXiv
pre-print
auto-configuration, and provides a core set of services and applications for coordination of people and devices including voice, text, and SCADA communication. ...
The same system is also likely to support coordination of recovery efforts after large-scale natural disasters. ...
Distribution approved for public release, distribution unlimited. Not export controlled per ES-FL-020821-0013. ...
arXiv:2102.05870v1
fatcat:yaan3sumojdprlsc7x72g5pjyy
Resilience in Critical Infrastructures: The Role of Modelling and Simulation
[chapter]
2020
Issues on Risk Analysis for Critical Infrastructure Protection [Working Title]
Resilience and risk are fundamental concepts for critical infrastructure protection, but it is complex to assess them. ...
MHR suggests considering three different layers in each infrastructure: holistic, service and reductionist agents. ...
This chapter is partially supported by the European Union's Horizon 2020 research and innovation programme under Grant Agreement No. 786409 (RESISTO -RESIlience enhancement and risk control platform for ...
doi:10.5772/intechopen.94506
fatcat:wae3p5dypnetnlgzbqar2wxgza
Infrastructure web: distributed monitoring and managing critical infrastructures
2001
Enabling Technologies for Law Enforcement and Security
To this end, we have designed an underlying web-like architecture that will serve as a platform for the decentralized monitoring and management of national critical infrastructures. ...
(health, law enforcement, emergency management) and commerce (financial services, logistics). ...
UDDI is also a framework for Web services integration that contains specifications for service description and discovery. ...
doi:10.1117/12.417522
fatcat:lyftn72aknaqnldsvf43qukrje
Dynamic Trust Management
2009
Computer
There are clear tradeoffs among security, flexibility, and cost in possible designs for such SOAs. ...
In processing a request, the service can, in turn, send requests to secondary services and so on. ...
Once such a policy is specified, the specification can be used to check access decisions for files on a computer, database records, imagery, Web services, or real-time chat. ...
doi:10.1109/mc.2009.51
fatcat:po2ntel4nngnlc2rtzuxrszja4
Networking for critical conditions
2008
IEEE wireless communications
Network interface
Services interconnection module Policy control module (PCM)
QoS interconnection module MAC interconnection module by chance. ...
Figure 4 shows a system architectural view of this interconnection platform, where the services interconnection module, QoS interconnection module, and medium access control (MAC) interconnection module ...
doi:10.1109/mwc.2008.4492980
fatcat:4bay7fsdl5hvlcmzym4jiqeqn4
GEMBus Based Services Composition Platform for Cloud PaaS
[chapter]
2012
Lecture Notes in Computer Science
The ESB is widely used as a platform for SOA and Web Services based integrated enterprise solutions. ...
Cloud Platform as a Service (PaaS) provides an environment for creating and deploying applications using one of popular development platforms. ...
, and platform security such as firewalling, intrusion detection, etc. ...
doi:10.1007/978-3-642-33427-6_3
fatcat:7cnmlpfj35ajnimrzqpzgwxqxm
« Previous
Showing results 1 — 15 out of 789 results