A quantitative analysis of current security concerns and solutions for cloud computing

N Gonzalez, C Miers, F Redigolo, M Simplicio… - Journal of Cloud …, 2012 - Springer
Abstract The development of cloud computing services is speeding up the rate in which the
organizations outsource their computational services or sell their idle computational …

Adaptive use of network-centric mechanisms in cyber-defense

M Atighetchi, P Pal, F Webber… - Sixth IEEE International …, 2003 - ieeexplore.ieee.org
Attacks against distributed systems frequently start at the network layer by gathering network
related information (such as open TCP ports) and continue on by exhausting resources, or …

Steward: Scaling byzantine fault-tolerant replication to wide area networks

Y Amir, C Danilov, D Dolev, J Kirsch… - … on Dependable and …, 2008 - ieeexplore.ieee.org
This paper presents the first hierarchical byzantine fault-tolerant replication architecture
suitable to systems that span multiple wide-area sites. The architecture confines the effects …

Precise identification of problems for structural test generation

X Xiao, T Xie, N Tillmann, J De Halleux - Proceedings of the 33rd …, 2011 - dl.acm.org
An important goal of software testing is to achieve at least high structural coverage. To
reduce the manual efforts of producing such high-covering test inputs, testers or developers …

Scaling byzantine fault-tolerant replication towide area networks

Y Amir, C Danilov, J Kirsch, J Lane… - … and Networks (DSN' …, 2006 - ieeexplore.ieee.org
This paper presents the first hierarchical Byzantine fault-tolerant replication architecture
suitable to systems that span multiple wide area sites. The architecture confines the effects …

The design of a generic intrusion-tolerant architecture for web servers

A Saidane, V Nicomette… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Nowadays, more and more information systems are connected to the Internet and offer Web
interfaces to the general public or to a restricted set of users. Such openness makes them …

Adaptive cyberdefense for survival and intrusion tolerance

M Atighetchi, P Pal, F Webber, R Schantz… - IEEE Internet …, 2004 - ieeexplore.ieee.org
While providing some resistance against cyberattacks, current approaches to securing
networked and distributed information systems are mainly concerned with static prevention …

Survivability architecture of a mission critical system: The DPASA example

J Chong, P Pal, M Atigetchi, P Rubel… - 21st Annual Computer …, 2005 - ieeexplore.ieee.org
Many techniques and mechanisms exist today, some COTS, others less mature research
products that can be used to deflect, detect, or even recover from specific types of cyber …

Customizable fault tolerance forwide-area replication

Y Amir, B Coan, J Kirsch, J Lane - 2007 26th IEEE International …, 2007 - ieeexplore.ieee.org
Constructing logical machines out of collections of physical machines is a well-known
technique for improving the robustness and fault tolerance of distributed systems. We …

A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture

R Stroud, I Welch, J Warne… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
MAFTIA was a three-year European research project that explored the use of fault-tolerance
techniques to build intrusion-tolerant systems. The MAFTIA architecture embodies a number …