2 research outputs found

    experiences on intrusion tolerance distributed systems

    No full text
    IEEE Comp SocDistributed systems today are very vulnerable to malicious attacks, either from insiders or outsiders. When an attacker controls a component of the system, he may steal some sensitive information, create some false information, or prevent leg
    corecore