A survey of software aging and rejuvenation studies
Software aging is a phenomenon plaguing many long-running complex software systems,
which exhibit performance degradation or an increasing failure rate. Several strategies …
which exhibit performance degradation or an increasing failure rate. Several strategies …
Efficient remote data possession checking in critical information infrastructures
F Sebé, J Domingo-Ferrer… - … on Knowledge and …, 2008 - ieeexplore.ieee.org
Checking data possession in networked information systems such as those related to critical
infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of …
infrastructures (power facilities, airports, data vaults, defense systems, etc.) is a matter of …
A systematic survey of self-protecting software systems
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …
Architecture-based self-protecting software systems
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …
statically deployed, they are no longer sufficient against today's sophisticated and evolving …
Fault tolerance via diversity for off-the-shelf products: A study with SQL database servers
If an off-the-shelf software product exhibits poor dependability due to design faults, then
software fault tolerance is often the only way available to users and system integrators to …
software fault tolerance is often the only way available to users and system integrators to …
From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures
This paper analyzes security problems of modern computer systems caused by
vulnerabilities in their operating systems (OSs). Our scrutiny of widely used enterprise OSs …
vulnerabilities in their operating systems (OSs). Our scrutiny of widely used enterprise OSs …
F (I) MEA-technique of web services analysis and dependability ensuring
Dependability analysis of the Web Services (WSs), dsclosure of possible failure modes and
their effects are open problems. This paper gives results of the Web Services dependability …
their effects are open problems. This paper gives results of the Web Services dependability …
Securing iot-based cyber-physical human systems against collaborative attacks
Security issues in the IoT based CPS are exacerbated with human participation in CPHS
due to the vulnerabilities in both the technologies and the human involvement. A holistic …
due to the vulnerabilities in both the technologies and the human involvement. A holistic …
A comparison of intrusion-tolerant system architectures
Q Nguyen, A Sood - IEEE Security & Privacy, 2010 - ieeexplore.ieee.org
Comparative Analysis of Intrusion-Tolerant System Architectures Page 1 1 Comparative
Analysis of Intrusion-Tolerant System Architectures Quyen L. Nguyen1 and Arun Sood1,2 …
Analysis of Intrusion-Tolerant System Architectures Quyen L. Nguyen1 and Arun Sood1,2 …
Adaptive cyberdefense for survival and intrusion tolerance
While providing some resistance against cyberattacks, current approaches to securing
networked and distributed information systems are mainly concerned with static prevention …
networked and distributed information systems are mainly concerned with static prevention …