2 research outputs found
experiences on intrusion tolerance distributed systems
IEEE Comp SocDistributed systems today are very vulnerable to malicious attacks, either from insiders or outsiders. When an attacker controls a component of the system, he may steal some sensitive information, create some false information, or prevent leg