Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
software fault tolerance
biblio
Towards Secure and Dependable Authentication and Authorization Infrastructures
Submitted by BrandonB on Mon, 05/04/2015 - 2:47pm
intrusion-tolerant replication
untrusted gateways
trusted components
software fault tolerance
Servers
security
resilience architecture
RADIUS
Public key
Protocols
OpenID
Logic gates
IT infrastructures
authentication
intrusion tolerance
fault-free executions
enterprise environments
diverse computing environments
dependability
authorization infrastructures
authorisation
authentication security
authentication infrastructures
authentication dependability
authentication and authorization services
biblio
Evaluation of Web Security Mechanisms Using Vulnerability amp; Attack Injection
Submitted by BrandonB on Thu, 04/30/2015 - 3:06pm
security
Web application security mechanism evaluation
vulnerability-&-attack injector tool
vulnerability injection methodology
VAIT
TV
SQL Injection attacks
SQL
software fault tolerance
Software
security of data
attack injection methodology
review and evaluation
Probes
intrusion detection system
Internet applications
internet
Input variables
Fault injection
fault diagnosis
Educational institutions
Databases
biblio
Analysis of Field Data on Web Security Vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:03pm
security of data
XSS
Web security vulnerabilities
Web application vulnerabilities
vulnerability scanners
static code analyzers
SQL injection
SQL
source code (software)
source code
software faults
software fault tolerance
Software
security patches
attack injectors
security mechanisms
security
review and evaluation
realistic vulnerability
languages
Java
Intrusion Detection Systems
Internet applications
internet
field data analysis
code inspectors
Blogs
Awards activities
biblio
Application-Aware Byzantine Fault Tolerance
Submitted by BrandonB on Thu, 04/30/2015 - 3:03pm
finite state machines
totally ordered request
System recovery
state-machine-based Byzantine fault tolerance algorithm
software fault tolerance
Servers
sequential execution
Semantics
security of data
request concurrent processing
replica nondeterminism
Message systems
Intrusion Resilience
Algorithm design and analysis
Fault tolerant systems
fault tolerance
deterministic application processing
dependability
Deferred Byzantine Agreement
concurrency control
computer system intrusion resilience enhancement
client-server systems
Byzantine agreement
application-aware Byzantine fault tolerance
application semantics
Application Nondeterminism
biblio
Application-Aware Byzantine Fault Tolerance
Submitted by BrandonB on Thu, 04/30/2015 - 3:02pm
finite state machines
totally ordered request
System recovery
state-machine-based Byzantine fault tolerance algorithm
software fault tolerance
Servers
sequential execution
Semantics
security of data
request concurrent processing
replica nondeterminism
Message systems
Intrusion Resilience
Algorithm design and analysis
Fault tolerant systems
fault tolerance
deterministic application processing
dependability
Deferred Byzantine Agreement
concurrency control
computer system intrusion resilience enhancement
client-server systems
Byzantine agreement
application-aware Byzantine fault tolerance
application semantics
Application Nondeterminism
« first
‹ previous
1
2
3
4