Back to Results
First PageMeta Content
Replicas / Computer storage / Replication / Medicine / Software aging / Rejuvenation / State machine replication / Fault-tolerant computer systems / Data synchronization / Computing


Towards a Practical Survivable Intrusion Tolerant Replication System Marco Platania, Daniel Obenshain, Thomas Tantillo, Ricky Sharma, Yair Amir Department of Computer Science at Johns Hopkins University {platania, dano,
Add to Reading List

Document Date: 2014-09-14 08:51:14


Open Document

File Size: 459,00 KB

Share Result on Facebook

Company

Dell / Intel / Siemens / B. Software / /

/

Event

FDA Phase / /

Facility

Replicas checkpoint / Johns Hopkins University / /

IndustryTerm

cheaper software diversity solutions / built-in operating system tools / software aspects / networkspecific constant accounting / physical hardware / collaborative state transfer protocol / communication systems / software errors / software components / intrusion tolerant systems / stateless systems / proactive recovery protocol / software aging / internal service network / proactive recovery algorithm / software diversity / software systems / large state applications / private network / i.e. solutions / software reliability / largestate applications / external network / software rejuvenation / physical server / to stateless systems / software architectures / background protocol / intrusion-tolerant replicated systems / intrusion tolerant replication systems / /

OperatingSystem

CentOS / /

Organization

Yair Amir Department of Computer Science / Johns Hopkins University / /

Person

Ricky Sharma / Thomas Tantillo / Daniel Obenshain / /

Position

TPM manager / system administrator / manager in Dom0 / proactive recovery scheduler / correct and fast leader / scheduler / /

Product

SQL injection / Trusted Platform Module / BFT / /

ProvinceOrState

Manitoba / /

Technology

virtual machine / proactive recovery algorithm / proactive recovery protocol / Prime BFT protocol / Prime protocol / BFT protocols / private key / operating system / operating systems / collaborative state transfer protocol / public key / firewall / BFT protocol / 3.50 GHz processor / Dom / previous BFT protocols / background protocol / typical BFT protocols / Gigabit Ethernet / not allow destroying a virtual machine / /

SocialTag