Distributed Voting for Security and Fault Tolerance

Distributed Voting for Security and Fault Tolerance
Title Distributed Voting for Security and Fault Tolerance PDF eBook
Author Kevin A. Kwiat
Publisher
Pages 108
Release 2001-05-01
Genre Aerospace engineering
ISBN 9781423529866

Download Distributed Voting for Security and Fault Tolerance Book in PDF, Epub and Kindle

Faults present risk to the success to an aerospace mission, so they will continually be a concern of the fault tolerance community. In this report, we take up the issue of security in conjunction with fault tolerance. This motivated us to devise new approaches to distributed voting. Within a LAN (and some cases a WAN) we replace the almost ubiquitous 2-phase commit protocol with one that is light-weight and improves both performance and security without losing any of the traditional fault coverage. Accompanying this algorithin is one that we propose for resolving correct-but-possibly-not-identical votes within a WAN. Both of these algorithms are used to uniquely enhance the integrity of distributed information systems-- protecting them from faults and hostile attacks.

Distributed Voting for Security and Fault Tolerance

Distributed Voting for Security and Fault Tolerance
Title Distributed Voting for Security and Fault Tolerance PDF eBook
Author
Publisher
Pages 0
Release 2001
Genre
ISBN

Download Distributed Voting for Security and Fault Tolerance Book in PDF, Epub and Kindle

Faults present risk to the success to an aerospace mission, so they will continually be a concern of the fault tolerance community. In this report, we take up the issue of security in conjunction with fault tolerance. This motivated us to devise new approaches to distributed voting. Within a LAN (and some cases a WAN) we replace the almost ubiquitous 2-phase commit protocol with one that is light-weight and improves both performance and security without losing any of the traditional fault coverage. Accompanying this algorithin is one that we propose for resolving correct-but-possibly-not-identical votes within a WAN. Both of these algorithms are used to uniquely enhance the integrity of distributed information systems-- protecting them from faults and hostile attacks.

Fault-tolerance Implemented by Voting Protocols in Distributed Systems

Fault-tolerance Implemented by Voting Protocols in Distributed Systems
Title Fault-tolerance Implemented by Voting Protocols in Distributed Systems PDF eBook
Author Per Gunningberg
Publisher
Pages 138
Release 1983
Genre Computer network protocols
ISBN

Download Fault-tolerance Implemented by Voting Protocols in Distributed Systems Book in PDF, Epub and Kindle

Fault Tolerance in Distributed Systems using Dynamic Vote Management

Fault Tolerance in Distributed Systems using Dynamic Vote Management
Title Fault Tolerance in Distributed Systems using Dynamic Vote Management PDF eBook
Author
Publisher
Pages
Release
Genre
ISBN

Download Fault Tolerance in Distributed Systems using Dynamic Vote Management Book in PDF, Epub and Kindle

There are several fault tolerant protocols for managing replicated files in the event of network partitioning due to site or communication link failures. Previously there has been no software simulation of the voting protocols apart from just stochastic modeling. In this paper, we simulate and analyze the throughput of message transfer during the communication. We use various network topologies to compare the parameters such as throughput, no of packets received and sent during voting process .We have analyzed the effects of various packet properties. The analysis provides evidence for the conjecture that the grouping scheme is the optimal algorithm in the context of the voting protocols. We also compare the proposed genetic approach for voting assignment with random algorithm proposed by Akhil Kumar. This comparison shows that genetic voting assignment gives better availability than random algorithm.

Advanced Computing and Systems for Security

Advanced Computing and Systems for Security
Title Advanced Computing and Systems for Security PDF eBook
Author Rituparna Chaki
Publisher Springer
Pages 324
Release 2015-11-18
Genre Technology & Engineering
ISBN 8132226534

Download Advanced Computing and Systems for Security Book in PDF, Epub and Kindle

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Fault Tolerance in Distributed Systems

Fault Tolerance in Distributed Systems
Title Fault Tolerance in Distributed Systems PDF eBook
Author Pankaj Jalote
Publisher Prentice Hall
Pages 456
Release 1994
Genre Computers
ISBN

Download Fault Tolerance in Distributed Systems Book in PDF, Epub and Kindle

Fault tolerance is an approach by which reliability of a computer system can be increased beyond what can be achieved by traditional methods. Comprehensive and self-contained, this book explores the information available on software supported fault tolerance techniques, with a focus on fault tolerance in distributed systems.

14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)

14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)
Title 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) PDF eBook
Author Juan José Gude Prego
Publisher Springer Nature
Pages 431
Release 2021-09-21
Genre Technology & Engineering
ISBN 3030878724

Download 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) Book in PDF, Epub and Kindle

This book of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2021 and ICEUTE 2021, all conferences held in the beautiful and historic city of Bilbao (Spain), in September 2021. The aim of the 14th CISIS 20121 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2021 International Program Committee selected 23 papers which are published in these conference proceedings achieving an acceptance rate of 40%. In this relevant edition, a special emphasis was put on the organization of special sessions. One special session is organized related to relevant topics as follows: building trust in ecosystems and ecosystem components. In the case of 12th ICEUTE 2021, the International Program Committee selected 17 papers, which are published in these conference proceedings. One special session is organized related to relevant topics as follows: sustainable personal goals: engaging students in their learning process. The selection of papers is extremely rigorous in order to maintain the high quality of the conference, and we would like to thank the members of the program committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS and ICEUTE conferences would not exist without their help.