An intrusion tolerant identity provider with user attributes confidentiality
… the present paper to create an Intrusion Tolerant Identity Provider (IT-IdP) that maintains
Authentication Services available and secure, and … In this work we adopt this scheme as default. …
Authentication Services available and secure, and … In this work we adopt this scheme as default. …
Intrusion-tolerant and confidentiality-preserving publish/subscribe messaging
… any IoT and big data applications where individual user data … Our scheme supports an
arbitrary number of vectors, each of … We use ECDSA for authentication and use SHA-256 as our …
arbitrary number of vectors, each of … We use ECDSA for authentication and use SHA-256 as our …
Protecting scientific workflows in clouds with an intrusion tolerant system
Y Wang, Y Guo, Z Guo, W Liu… - IET Information Security, 2020 - Wiley Online Library
… (v) We construct an intrusion tolerant scientific workflow prototype system to evaluate the
performance of the proposed scheme based on OpenStack and the actual network attack. …
performance of the proposed scheme based on OpenStack and the actual network attack. …
Toward intrusion tolerance as a service: Confidentiality in partially cloud-based BFT systems
… Under this model, application logic and data are only … from the recent Spire intrusion-tolerant
SCADA system for the … (f + 1,n)-threshold scheme to ensure the message is agreed on by at …
SCADA system for the … (f + 1,n)-threshold scheme to ensure the message is agreed on by at …
Trust-Based Intrusion-Tolerant Coverage Reliability in Intelligent IoT Systems
Y Xia, X Tang, L Yi, Y Yi, M Cheng… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
… Abstract—The Internet of Things (IoT) has recently experi… and reliability in intelligent IoT
applications. Ensuring that … (WKSH) clustering integration scheme was proposed to protect …
applications. Ensuring that … (WKSH) clustering integration scheme was proposed to protect …
Survey on Intrusion Tolerant Systems in Emerging Technologies
N Sanoussi, G Orhanou - ITM Web of Conferences, 2024 - itm-conferences.org
… It uses intrusion tolerant techniques such as voting algorithm, … mechanisms that ensures
authentication, authorization, in addition … SDN Master-Slave controller uses a replication scheme …
authentication, authorization, in addition … SDN Master-Slave controller uses a replication scheme …
ITC: Intrusion tolerant controller for multicontroller SDN architecture
N Sanoussi, K Chetioui, G Orhanou, S El Hajji - Computers & Security, 2023 - Elsevier
… The first mechanism uses a virtual controller redundancy based on the existing Virtual … in
the Acknowledgements and have given us their written permission to be named. If we have not …
the Acknowledgements and have given us their written permission to be named. If we have not …
[PDF][PDF] Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance Methods
F Di Giandomenico, G Masetti… - International Journal of …, 2022 - intapi.sciendo.com
… intrusion tolerant alternatives from classical fault tolerance … Through authentication and
authorization, access control policies … contexts/application domains. Deciding which part of the …
authorization, access control policies … contexts/application domains. Deciding which part of the …
Simplifying the deployment of intrusion-tolerant systems by leveraging cloud resources
M Khan - 2024 - d-scholarship.pitt.edu
… In Chapter 5, we show that our Decoupled Intrusion-Tolerant System meets application …
Practical secretsharing schemes today support limited operations such as key-value storage [71], …
Practical secretsharing schemes today support limited operations such as key-value storage [71], …
Quantitative security evaluation of intrusion tolerant systems with Markovian arrivals
… Confidentiality is to make sure that the data are available only for intended and authorized …
the application perspective: a) Evaluation of the overhead of the intrusion tolerance scheme of …
the application perspective: a) Evaluation of the overhead of the intrusion tolerance scheme of …