Filters








789 Hits in 3.8 sec

Asynchronous intrusion recovery for interconnected web services

Ramesh Chandra, Taesoo Kim, Nickolai Zeldovich
2013 Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles - SOSP '13  
This paper presents Aire, an intrusion recovery system for such web services.  ...  Web services are an important example of an interconnected system, as they are increasingly using protocols such as OAuth and REST APIs to integrate with one another.  ...  Acknowledgments We thank Frans Kaashoek, Eddie Kohler, the anonymous reviewers, and our shepherd, Michael Walfish, for their help and feedback.  ... 
doi:10.1145/2517349.2522725 dblp:conf/sosp/ChandraKZ13 fatcat:yqdx7nfh4jfrbe2gvbpg46ncfq

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture [chapter]

Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia
2006 Lecture Notes in Computer Science  
The largely computerised nature of critical infrastructures and the pervasive interconnection of systems all over the world have generated the problem of achieving resilience of critical information infrastructures  ...  paper focuses on the computer systems behind electrical utility infrastructures, and proposes the blueprint of a distributed systems architecture that we believe may come to be useful as a reference for  ...  Malicious-and Accidental-Fault Tolerance for Internet Applications. The web site of the project is at www.maftia.org. Virtual LANs  ... 
doi:10.1007/11962977_1 fatcat:icn65da2qjhhbpujn5ekj4irti

The CRUTIAL reference critical information infrastructure architecture: a blueprint

Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia
2008 International Journal of System of Systems Engineering  
Critical infrastructures have evolved over the past decades to become largely computerised and interconnected all over the world.  ...  It proposes the blueprint of a distributed systems architecture that we believe may come to be useful as a reference for modern CII in general.  ...  We warmly thank our partners in the project for many discussions on the topics of this paper.  ... 
doi:10.1504/ijsse.2008.018132 fatcat:74mwshex5nhhpp5sloqoyo2wii

The CRUTIAL Architecture for Critical Information Infrastructures [chapter]

Paulo Veríssimo, Nuno F. Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone
2008 Lecture Notes in Computer Science  
(ii) Middleware devices that achieve runtime automatic tolerance of remaining faults and intrusions, supplying trusted services out of non-trustworthy components.  ...  Then, the Protection Strategies and Services are introduced in Section 3, followed by the Trustworthiness Monitoring Services in Section 4.  ...  We warmly thank our partners at the project for many discussions on the topics of the chapter.  ... 
doi:10.1007/978-3-540-85571-2_1 fatcat:zym7eqqe4zb2fnm3vbrkeiaq5i

A Survey on Security Mechanisms of Leading Cloud Service Providers

Deepak Panth, Dhananjay Mehta, Rituparna Shelgaonkar
2014 International Journal of Computer Applications  
Clouding Computing is a virtual pool of resources provided to users as service through a web interface. These resources may include Software, Infrastructure, Storage, Network, Platform etc.  ...  With an unprecedented pace of developments in Cloud computing technology, there has been an exponential increase of users of these services and an equal rise of cloud services providers.  ...  Audit Logging, Intrusion Detection, LDAP and Active Directory [6], Traffic Screening and Surveillance [9].  ... 
doi:10.5120/17149-7184 fatcat:262geqqsqbet7gofec7wyrn2di

State of Art Survey for Fault Tolerance Feasibility in Distributed Systems

Arshad A. Hussein, Adel AL-zebari, Naaman Omar, Karwan Jameel Merceedi, Abdulraheem Jamil Ahmed, Nareen O. M. Salim, Sheren Sadiq Hasan, Shakir Fattah Kak, Ibrahim Mahmood Ibrahim, Hajar Maseeh Yasin, Azar Abid Salih
2021 Asian Journal of Research in Computer Science  
The use of technology has grown dramatically, and computer systems are now interconnected via various communication mediums.  ...  tolerance (FT) techniques in distributed systems to ensure replication, high redundancy, and high availability of distributed services.  ...  A state of art survey for web server performance Eesa AS. Optimization algorithms for intrusion detection system: A review, International Journal of Research-Granthaalayah. 2020;8:217-225. 56.  ... 
doi:10.9734/ajrcos/2021/v11i430268 fatcat:asp5rhd3lvdgrkyvprmgqcoyoq

Infrastructure Web [chapter]

Guofei Jiang
2004 Statistics: A Series of Textbooks and Monographs  
To this end, we have designed an underlying web-like architecture that will serve as a platform for the decentralized monitoring and management of national critical infrastructures.  ...  (health, law enforcement, emergency management) and commerce (financial services, logistics).  ...  UDDI is also a framework for Web services integration that contains specifications for service description and discovery.  ... 
doi:10.1201/9781420030884.ch17 fatcat:nefc36t5wvaa7ezgdstbr2c5bi

Non-intrusive QoS monitoring and analysis for self-healing web services

Riadh Ben Halima, Karim Guennoun, Khalil Drira, Mohamed Jmaiel
2008 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)  
Monitoring and analysis of QoS are crucial steps for the provisioning of self-healing web services and for managing web service-based distributed interactive applications.  ...  This framework has been implemented and experimented for the web service technology within the European WS-DIAMOND 1 project.  ...  The Repair web service asked for recovery, substitutes Shop1 by Shop2 in a seamless way to the requester and the provider.  ... 
doi:10.1109/icadiwt.2008.4664408 fatcat:jzi64jmjrvfr3amgatl4kiayri

A Review Paper on Secure Virtualization for Cloud Computing

Pankaj Saraswat, Ms. Anjali
2022 International Journal of Innovative Research in Engineering & Management  
In specifically, we present the Advanced-Cloud-Protection-System (ACPS), a new construction targeted at ensuring improved security for cloud resources.  ...  added assaults.  SEI5-Recovery: In the event of a catastrophe, the cloud provider must offer an operative duplication and repossession method to restore-services.  SEI6 Accountability: notwithstanding  ...  INTRODUCTION The Internet is also about to enter a new era, wherein resources are internationally interconnected and easily transferred [1] .  ... 
doi:10.55524/ijirem.2022.9.1.103 fatcat:tnfpmoy4d5g6fcylmlftp6bjeq

Talking After Lights Out: An Ad Hoc Network for Electric Grid Recovery [article]

Jan Janak, Dana Chee, Hema Retty, Artiom Baloian, Henning Schulzrinne
2021 arXiv   pre-print
auto-configuration, and provides a core set of services and applications for coordination of people and devices including voice, text, and SCADA communication.  ...  The same system is also likely to support coordination of recovery efforts after large-scale natural disasters.  ...  Distribution approved for public release, distribution unlimited. Not export controlled per ES-FL-020821-0013.  ... 
arXiv:2102.05870v1 fatcat:yaan3sumojdprlsc7x72g5pjyy

Resilience in Critical Infrastructures: The Role of Modelling and Simulation [chapter]

Chiara Foglietta, Stefano Panzieri
2020 Issues on Risk Analysis for Critical Infrastructure Protection [Working Title]  
Resilience and risk are fundamental concepts for critical infrastructure protection, but it is complex to assess them.  ...  MHR suggests considering three different layers in each infrastructure: holistic, service and reductionist agents.  ...  This chapter is partially supported by the European Union's Horizon 2020 research and innovation programme under Grant Agreement No. 786409 (RESISTO -RESIlience enhancement and risk control platform for  ... 
doi:10.5772/intechopen.94506 fatcat:wae3p5dypnetnlgzbqar2wxgza

Infrastructure web: distributed monitoring and managing critical infrastructures

Guofei Jiang, George Cybenko, Dennis McGrath, Simon K. Bramble, Edward M. Carapezza, Lenny I. Rudin
2001 Enabling Technologies for Law Enforcement and Security  
To this end, we have designed an underlying web-like architecture that will serve as a platform for the decentralized monitoring and management of national critical infrastructures.  ...  (health, law enforcement, emergency management) and commerce (financial services, logistics).  ...  UDDI is also a framework for Web services integration that contains specifications for service description and discovery.  ... 
doi:10.1117/12.417522 fatcat:lyftn72aknaqnldsvf43qukrje

Dynamic Trust Management

Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee
2009 Computer  
There are clear tradeoffs among security, flexibility, and cost in possible designs for such SOAs.  ...  In processing a request, the service can, in turn, send requests to secondary services and so on.  ...  Once such a policy is specified, the specification can be used to check access decisions for files on a computer, database records, imagery, Web services, or real-time chat.  ... 
doi:10.1109/mc.2009.51 fatcat:po2ntel4nngnlc2rtzuxrszja4

Networking for critical conditions

N. Ansari, Chao Zhang, R. Rojas-Cessa, P. Sakarindr, E.S.H. Hou
2008 IEEE wireless communications  
Network interface Services interconnection module Policy control module (PCM) QoS interconnection module MAC interconnection module by chance.  ...  Figure 4 shows a system architectural view of this interconnection platform, where the services interconnection module, QoS interconnection module, and medium access control (MAC) interconnection module  ... 
doi:10.1109/mwc.2008.4492980 fatcat:4bay7fsdl5hvlcmzym4jiqeqn4

GEMBus Based Services Composition Platform for Cloud PaaS [chapter]

Yuri Demchenko, Canh Ngo, Pedro Martínez-Julia, Elena Torroglosa, Mary Grammatikou, Jordi Jofre, Steluta Gheorghiu, Joan A. Garcia-Espin, Antonio D. Perez-Morales, Cees de Laat
2012 Lecture Notes in Computer Science  
The ESB is widely used as a platform for SOA and Web Services based integrated enterprise solutions.  ...  Cloud Platform as a Service (PaaS) provides an environment for creating and deploying applications using one of popular development platforms.  ...  , and platform security such as firewalling, intrusion detection, etc.  ... 
doi:10.1007/978-3-642-33427-6_3 fatcat:7cnmlpfj35ajnimrzqpzgwxqxm
« Previous Showing results 1 — 15 out of 789 results