Download now Free registration required
Much of th people critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As the people dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those that are successful in compromising parts of the system. This paper presents fault free randomized intrusion tolerant protocols and techniques capable of guaranteeing correctness, availability, and good performance even when some of the servers are compromised, enabling the construction of highly available and highly resilient systems for the authors' critical infrastructure.
- Format: PDF
- Size: 1113.4 KB