On the Dependability of Highly Heterogeneous and Open Distributed Systems
暂无分享,去创建一个
[1] Zhe Wang,et al. Fault tolerance in heterogeneous distributed systems , 2014, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[2] Brian Randell,et al. Dependability and its threats - A taxonomy , 2004, IFIP Congress Topical Sessions.
[3] Thu D. Nguyen,et al. Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions , 2006, J. Comput..
[4] Naftaly H. Minsky,et al. Establishing Global Properties of Multi-Agent Systems Via Local Laws , 2006, E4MAS.
[5] Victoria Ungureanu,et al. Building reconfiguration primitives into the law of a system , 1996, Proceedings of International Conference on Configurable Distributed Systems.
[6] Fabio Casati,et al. Business-oriented management of Web services , 2003, CACM.
[7] Naftaly H. Minsky,et al. In Vivo Evolution of Policies that Govern a Distributed System , 2009, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks.
[8] Barbara Liskov,et al. Distributed programming in Argus , 1988, CACM.
[9] Naftaly H. Minsky,et al. Decentralized Governance of Distributed Systems via Interaction Control , 2012, Logic Programs, Norms and Action.
[10] Ravi S. Sandhu,et al. The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.
[11] Judith Bishop,et al. Aspect-Oriented Programming for a distributed framework : reviewed article , 2006 .
[12] Bruno Crispo,et al. xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement , 2010, IFIPTM.
[13] Brian Randell,et al. System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.
[14] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[15] Wade Trappe,et al. Coordination and Control in Mobile Ubiquitous Computing Applications Using Law Governed Interaction , 2010 .
[16] Vincenzo De Florio,et al. A survey of linguistic structures for application-level fault tolerance , 2008, CSUR.
[17] Naftaly H. Minsky,et al. Flexible Regulation of Distributed Coalitions , 2003, ESORICS.
[18] Richard D. Schlichting,et al. Fail-stop processors: an approach to designing fault-tolerant computing systems , 1983, TOCS.
[19] Fred B. Schneider,et al. Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.
[20] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[21] Andreas Haeberlen,et al. PeerReview: practical accountability for distributed systems , 2007, SOSP.
[22] Thierry Turletti,et al. The case for software-defined networking in heterogeneous networked environments , 2012, CoNEXT Student '12.
[23] Richard P. Martin,et al. Human-Aware Computer System Design , 2005, HotOS.
[24] John C. Knight,et al. Efficient hierarchic management for reconfiguration of networked information systems , 2004, International Conference on Dependable Systems and Networks, 2004.
[25] Zhe Wang,et al. Towards Secure Distributed Hash Table , 2015, CollaborateCom.
[26] Alexander Artikis,et al. Specifying norm-governed computational societies , 2009, TOCL.
[27] Andrea Omicini,et al. Environment as a first class abstraction in multiagent systems , 2007, Autonomous Agents and Multi-Agent Systems.
[28] Ji Zhang,et al. Enabling Safe Dynamic Component-Based Software Adaptation , 2004, WADS.
[29] Mira Mezini,et al. Aspect-oriented programming and modular reasoning , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[30] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[31] Jesper Andersson,et al. On decentralized self-adaptation: lessons from the trenches and challenges for the future , 2010, SEAMS '10.
[32] Donald D. Cowan,et al. An event-driven high level model for the specification of laws in open multi-agent systems , 2009, J. Syst. Softw..
[33] Ana Cristina Vieira de Melo,et al. Formalization of an architectural model for exception handling coordination based on CA action concepts , 2010, Sci. Comput. Program..
[34] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.
[35] Sean W. Smith,et al. Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors , 1998, USENIX Workshop on Electronic Commerce.
[36] Atul Prakash,et al. Methods and limitations of security policy reconciliation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[37] Jian Hu,et al. Application of Single sign-on (SSO) in Digital Campus , 2010, 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT).
[38] Naftaly H. Minsky,et al. On conditions for self-healing in distributed software systems , 2003, 2003 Autonomic Computing Workshop.
[39] Natalia Criado,et al. Norm Enforceability in Electronic Institutions? , 2010, MALLOW.
[40] Yingying Chen,et al. The concept of decentralized and secure electronic marketplace , 2008, Electron. Commer. Res..
[41] Martin K. Purvis,et al. Institutional Environments: A Framework for the Development of Open Multiagent Systems , 2014, IBERAMIA.
[42] Paolo Traverso,et al. Service-Oriented Computing: a Research Roadmap , 2008, Int. J. Cooperative Inf. Syst..
[43] Victoria Ungureanu,et al. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems , 2000, TSEM.
[44] Xuezheng Liu,et al. D3S: Debugging Deployed Distributed Systems , 2008, NSDI.
[45] Robbert van Renesse,et al. Experiences with the Amoeba distributed operating system , 1990, CACM.
[46] Paola Inverardi,et al. A Distributed Intrusion Detection Approach for Secure Software Architecture , 2005, EWSA.
[47] Jin Tong,et al. Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).
[48] R. Chadha,et al. A Cautionary Note About Policy Conflict Resolution , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[49] Santosh K. Shrivastava. Lessons Learned from Building and Using the Arjuna Distributed Programming System , 1994, Dagstuhl Seminar on Distributed Systems.
[50] Cecília M. F. Rubira,et al. Fault tolerance in concurrent object-oriented software through coordinated error recovery , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.
[51] Valérie Issarny,et al. Dealing with Multi-policy Security in Large Open Distributed Systems , 1998, ESORICS.
[52] Valérie Issarny,et al. Engineering Reconfigurable Distributed Software Systems: Issues Arising for Pervasive Computing , 2006, RODIN Book.
[53] A. Lazouski,et al. A Survey of Usage Control in Computer Security , 2008 .
[54] Jie Xu,et al. Coordinated exception handling in distributed object systems: from model to system implementation , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[55] Javier Vázquez-Salceda,et al. Organizing Multiagent Systems , 2005, Autonomous Agents and Multi-Agent Systems.
[56] Ken Moody,et al. Meta-policies for distributed role-based access control systems , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[57] William G. Griswold,et al. Getting started with ASPECTJ , 2001, CACM.
[58] Minsoo Kim,et al. Hierarchical Policy Model for Managing Heterogeneous Security Systems , 2008, 2008 International Symposium on Ubiquitous Multimedia Computing.
[59] Fred B. Schneider,et al. Byzantine generals in action: implementing fail-stop processors , 1984, TOCS.
[60] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[61] Carla Marceau,et al. Intrusion detection for distributed applications , 1999, CACM.
[62] Carlos Ribeiro,et al. A Policy-Oriented Language for Expressing Security Specifications , 2007, Int. J. Netw. Secur..
[63] Farhad Arbab,et al. Configuration and dynamic reconfiguration of components using the coordination paradigm , 2001, Future Gener. Comput. Syst..
[64] Marc Esteva,et al. AMELI: an agent-based middleware for electronic institutions , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..