An intrusion tolerant identity provider with user attributes confidentiality

L Barreto, J Fraga, F Siqueira - … of Information Security and Applications, 2021 - Elsevier
… the present paper to create an Intrusion Tolerant Identity Provider (IT-IdP) that maintains
Authentication Services available and secure, and … In this work we adopt this scheme as default. …

Intrusion-tolerant and confidentiality-preserving publish/subscribe messaging

S Duan, C Liu, X Wang, Y Wu, S Xu… - 2020 International …, 2020 - ieeexplore.ieee.org
… any IoT and big data applications where individual user data … Our scheme supports an
arbitrary number of vectors, each of … We use ECDSA for authentication and use SHA-256 as our …

Protecting scientific workflows in clouds with an intrusion tolerant system

Y Wang, Y Guo, Z Guo, W Liu… - IET Information Security, 2020 - Wiley Online Library
… (v) We construct an intrusion tolerant scientific workflow prototype system to evaluate the
performance of the proposed scheme based on OpenStack and the actual network attack. …

Toward intrusion tolerance as a service: Confidentiality in partially cloud-based BFT systems

M Khan, A Babay - 2021 51st Annual IEEE/IFIP International …, 2021 - ieeexplore.ieee.org
… Under this model, application logic and data are only … from the recent Spire intrusion-tolerant
SCADA system for the … (f + 1,n)-threshold scheme to ensure the message is agreed on by at …

Trust-Based Intrusion-Tolerant Coverage Reliability in Intelligent IoT Systems

Y Xia, X Tang, L Yi, Y Yi, M Cheng… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
… Abstract—The Internet of Things (IoT) has recently experi… and reliability in intelligent IoT
applications. Ensuring that … (WKSH) clustering integration scheme was proposed to protect …

Survey on Intrusion Tolerant Systems in Emerging Technologies

N Sanoussi, G Orhanou - ITM Web of Conferences, 2024 - itm-conferences.org
… It uses intrusion tolerant techniques such as voting algorithm, … mechanisms that ensures
authentication, authorization, in addition … SDN Master-Slave controller uses a replication scheme

ITC: Intrusion tolerant controller for multicontroller SDN architecture

N Sanoussi, K Chetioui, G Orhanou, S El Hajji - Computers & Security, 2023 - Elsevier
… The first mechanism uses a virtual controller redundancy based on the existing Virtual … in
the Acknowledgements and have given us their written permission to be named. If we have not …

[PDF][PDF] Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance Methods

F Di Giandomenico, G Masetti… - International Journal of …, 2022 - intapi.sciendo.com
intrusion tolerant alternatives from classical fault tolerance … Through authentication and
authorization, access control policies … contexts/application domains. Deciding which part of the …

Simplifying the deployment of intrusion-tolerant systems by leveraging cloud resources

M Khan - 2024 - d-scholarship.pitt.edu
… In Chapter 5, we show that our Decoupled Intrusion-Tolerant System meets application
Practical secretsharing schemes today support limited operations such as key-value storage [71], …

Quantitative security evaluation of intrusion tolerant systems with Markovian arrivals

J Zheng, H Okamura, T Dohi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… Confidentiality is to make sure that the data are available only for intended and authorized
the application perspective: a) Evaluation of the overhead of the intrusion tolerance scheme of …