2003 International Conference on Dependable Systems and Networks, 2003. Proceedings.
DOI: 10.1109/dsn.2003.1209971
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic validation of an intrusion-tolerant replication system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
23
0

Publication Types

Select...
4
4
2

Relationship

2
8

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 9 publications
0
23
0
Order By: Relevance
“…They have shown that modeling security using Markov chains can be quite informative and can facilitate the design of secure systems. Singh, et al [27] have used probabilistic models to study the security of intrusion-tolerant replication systems.…”
Section: Related Workmentioning
confidence: 99%
“…They have shown that modeling security using Markov chains can be quite informative and can facilitate the design of secure systems. Singh, et al [27] have used probabilistic models to study the security of intrusion-tolerant replication systems.…”
Section: Related Workmentioning
confidence: 99%
“…have produced a series of papers (see [2] and references therein) that use semi-Markov processes to compute security measures for intrusion tolerant systems. Also [5,17,18] use similar approaches to quantitative security evaluation. Jha et.…”
Section: Introductionmentioning
confidence: 98%
“…The latter can be analyzed using Markov techniques to obtain probabilistic measures of security. Singh et al [16] have used probabilistic modeling to validate an intrusion-tolerant system, emphasizing the effects of intrusions on the system behavior and the ability of the intrusion-tolerant mechanisms to handle those effects, while using very simple assumptions about the discovery and exploitation of vulnerabilities by the attackers to achieve those intrusions. Gupta et al [7] have used a similar approach to evaluate the security and performance of several intrusion-tolerant server architectures.…”
Section: Introductionmentioning
confidence: 99%