Filters








359,552 Hits in 5.0 sec

Securing Mission-Centric Operations in the Cloud [chapter]

Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri
2013 Secure Cloud Computing  
Additionally, in order to provide missions with further availability and fault tolerance guarantees, we propose a costeffective approach to harden the set of computational resources that have been selected  ...  This approach allows missions to obtain required fault tolerance guarantees from a third party in a transparent manner.  ...  Finally, modules in U are ordered with respect to users' requirements. The first f t unit in the ordered set U can be selected as the most appropriate fault tolerance module.  ... 
doi:10.1007/978-1-4614-9278-8_11 fatcat:k4rdaube2rblvdf234pe5wra5i

Leakage-Tolerant Computation with Input-Independent Preprocessing [chapter]

Nir Bitansky, Dana Dachman-Soled, Huijia Lin
2014 Lecture Notes in Computer Science  
In the malicious setting, we also require a common reference string, and a constant fraction of honest parties.  ...  They put forth notions of leakage tolerance for zero-knowledge and general secure multi-party computation that aim at capturing the best-possible security when the private inputs of honest parties are  ...  The state of the auxiliary parties is guaranteed, by strong OCL, to be simulatable independently of the input and output, as required. Thus, leakage-tolerance follows as required.  ... 
doi:10.1007/978-3-662-44381-1_9 fatcat:5nfpaiypmfhufbrin3nsbtpbyu

An intrusion tolerant transaction management model for wireless storage area networks

Yacine Djemaiel, Noureddine Boudriga, Soukeina Zouaidi
2013 2013 World Congress on Computer and Information Technology (WCCIT)  
a monitored wireless storage area network that is exposed to a set of security attacks.  ...  In this paper, we propose a novel intrusion tolerant transaction management model for wireless storage area networks.  ...  When the flex transaction is terminated without reaching an acceptable state, then a feedback is required from the user to decide whether to commit or not with partial result.  ... 
doi:10.1109/wccit.2013.6618725 fatcat:ul4f72jmdzazlb7wtyaeavmdwe

Leakage-Tolerant Interactive Protocols [chapter]

Nir Bitansky, Ran Canetti, Shai Halevi
2012 Lecture Notes in Computer Science  
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage.  ...  from the secret states of participating components.  ...  We thank Amit Sahai for telling us about the problems with proving leakage-tolerance of the standard three round zero-knowledge protocols and about the way this problem is solved in [GJS11] .  ... 
doi:10.1007/978-3-642-28914-9_15 fatcat:mjtgwsdpbfedzmqku3k3rp3icq

Highly Available Smart Grid Control Centers through Intrusion Tolerance [article]

Maryam Tanha, Fazirulhisyam Hashima, S. Shamalab, Khairulmizam Samsudin
2012 arXiv   pre-print
The security of the proposed architecture is evaluated with regard to availability and mean time to security failure as performance measures.  ...  Smart grid is interwoven with the information and communication technology infrastructure, and thus it is exposed to cyber security threats.  ...  capabilities and require human intervention to conduct a postmortem and deal with the identified security threats [39] .  ... 
arXiv:1209.6228v1 fatcat:to4xtgyoxzartl4sjau3nasnrq

Study of Two Kinds of Analysis Methods of Intrusion Tolerance System State Transition Model

Zhiyong Luo, Xu Yang, Guanglu Sun, Zhiqiang Xie
2019 Review of Computer Engineer Studies  
On the basis of existing intrusion tolerance model, increased to learning Status, the optimal state transition model of the invasion-tolerant system is proposed and analyzed respectively with the theory  ...  The experimental results show that increasing the learning state can enhance the tolerance of the system and ensure the stable operation of the system.  ...  actual security requirements of the system.  ... 
doi:10.18280/rces.060105 fatcat:dpba5om2g5dxfj3w2opajp2j4e

A method for modeling and quantifying the security attributes of intrusion tolerant systems

Bharat B. Madan, Katerina Goševa-Popstojanova, Kalyanaraman Vaidyanathan, Kishor S. Trivedi
2004 Performance evaluation (Print)  
This paper deals with various issues related to quantifying the security attributes of an intrusion tolerant system, such as the SITAR system.  ...  By transforming this model to a model with absorbing states, we compute a security measure called the "mean time (or effort) to security failure" and also compute probabilities of security failure due  ...  This is called the fail-secure state e g f , analogous to the fail-safe state in fault tolerance.  ... 
doi:10.1016/j.peva.2003.07.008 fatcat:7cykzwtuqffwrgvfiqbpy3ds3y

Systematic aid for developing middleware architectures

Valérie Issarny, Christos Kloukinas, Apostolos Zarras
2002 Communications of the ACM  
., to deal with problems like distribution, security, transactional processing, fault tolerance, etc..  ...  Different ways of composing middleware services into a middleware architecture that satisfies application requirements are possible.  ...  Moreover, we specify application requirements, e.g., security and fault tolerance, as constraints that should not hold for compositions.  ... 
doi:10.1145/508448.508474 fatcat:k6jtjkjwqzanrkeobnl3fewbtq

A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability

M. Al-Kuwaiti, N. Kyriakopoulos, S. Hussein
2009 IEEE Communications Surveys and Tutorials  
This paper presents a systematic approach for determining common and complementary characteristics of five widely-used concepts, dependability, fault-tolerance, reliability, security, and survivability  ...  Removing redundancies and clarifying ambiguities will help the mapping of broad user-specified requirements into objective performance parameters for analyzing and designing information infrastructures  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the manuscript reviewers who provided them with their valuable feedbacks and comments.  ... 
doi:10.1109/surv.2009.090208 fatcat:yk35zwskr5eehjpcohny4ww6pi

A Holistic Approach for Security Requirement Specification for Low-Cost, Distributed Ubiquitous Systems

Yanjun Zuo
2010 International Conference on Information Systems  
This paper presents a holistic approach for security requirement analysis for low cost, distributed ubiquitous systems.  ...  Our framework can assist system administrators to specify key security properties for a low-cost, distributed ubiquitous system and to define the specific security requirements for such a system.  ...  with other system components, and capability of tag robustness/fault tolerance).  ... 
dblp:conf/icis/Zuo10 fatcat:c6qupucncfeqpkzwyfml5bgoy4

Byzantine Agreement with a Rational Adversary [chapter]

Adam Groce, Jonathan Katz, Aishwarya Thiruvengadam, Vassilis Zikas
2012 Lecture Notes in Computer Science  
We show that perfectly secure BA is possible for t < n corruptions given complete knowledge of the adversary's preferences, and characterize when statistical security is possible with only partial knowledge  ...  ., equivalence of these problems, or the impossibility of tolerating t ≥ n/2 corruptions) do not hold in the rational model.  ...  One could weaken this definition to require statistical tolerability, i.e., require that the tolerability property is satisfied except with some negligible probability.  ... 
doi:10.1007/978-3-642-31585-5_50 fatcat:xxd5hrnqjfci3ijgkew7zq7aae

Designing a secure fail-safe cloud repository of paperworks of students and employees of educational institutions

Viktor P. Kochyn, Anatolii V. Zherelo
2021 Journal of the Belarusian State University. Mathematics and Informatics  
of written works is built on the basis of the Ceph distributed file system, which uses the NextCloud system and the virtual computing resources of the virtual network infrastructure of the Belarusian State  ...  organisations (abstracts, essays, term papers and theses, master's theses, deposited articles), providing secure storage and secure mobile access to stored data.  ...  When designing a secure fault-tolerant cloud repository, it is necessary to provide for the possibility of integration with corporate information systems [3] [4] [5] .  ... 
doi:10.33581/2520-6508-2021-3-104-108 fatcat:jxfrimxj5ze5lknaz3hzzwz2a4

Formal specification of fault-tolerance and its relation to computer security

D. G. Weber
1989 Software engineering notes  
An analogy is constructed between these fault-tolerance specifications and a particular class of specifications for computer security.  ...  These techniques require precise specification of the properties to be assured.  ...  One could not prove, or even state, that SIFT was fault tolerant without additionally stating and proving that it satisfied many other correctness properties as well.  ... 
doi:10.1145/75200.75240 fatcat:scr47hf5t5fahmlmgx7onximh4

Formal specification of fault-tolerance and its relation to computer security

D. G. Weber
1989 Proceedings of the 5th international workshop on Software specification and design - IWSSD '89  
An analogy is constructed between these fault-tolerance specifications and a particular class of specifications for computer security.  ...  These techniques require precise specification of the properties to be assured.  ...  One could not prove, or even state, that SIFT was fault tolerant without additionally stating and proving that it satisfied many other correctness properties as well.  ... 
doi:10.1145/75199.75240 fatcat:ju3rnglgqbdtvosngtwiu4jrby

Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

Jingyu Wang, Xuefeng Zheng, Dengliang Luo
2011 International Journal of Intelligent Systems and Applications  
This system adopts the method of hybrid fault model, active and passive replicas, state update and transfer, proactive recovery and diversity, and initially implements to tolerate F faulty replicas in  ...  In order to address the problem of intrusion tolerance of cloud computing platform and sensitive data in new enterprise data center, this paper constructs a virtualization intrusion tolerance system based  ...  Several people in network security and cloud computing areas have contributed to the security of cloud platform, as well as to the related secure virtualization and trusted computing efforts.  ... 
doi:10.5815/ijisa.2011.01.08 fatcat:hyudqqvsavdhfc2wnoivx42s2y
« Previous Showing results 1 — 15 out of 359,552 results