Proceedings 2003 Symposium on Security and Privacy
DOI: 10.1109/swste.2003.1245312
|View full text |Cite
|
Sign up to set email alerts
|

Self-stabilizing autonomic recoverer for eventual Byzantine software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…The algorithm is presented in Figure 4. The plant state reflection and dynamic plant replication capabilities allows us to learn the connected component of s p−curr in the most efficient manner by experimentation on the plant replicas: we record the visited plant states and prune search paths that reach already visited states (lines [1][2][3][4][5][6][7][8][9][10][11][12][13][14]. Note that the algorithm explores all outgoing edges of each state s i reachable from s p−curr exactly once.…”
Section: Algorithm I (Static Replication From Current State No Reflementioning
confidence: 99%
“…The algorithm is presented in Figure 4. The plant state reflection and dynamic plant replication capabilities allows us to learn the connected component of s p−curr in the most efficient manner by experimentation on the plant replicas: we record the visited plant states and prune search paths that reach already visited states (lines [1][2][3][4][5][6][7][8][9][10][11][12][13][14]. Note that the algorithm explores all outgoing edges of each state s i reachable from s p−curr exactly once.…”
Section: Algorithm I (Static Replication From Current State No Reflementioning
confidence: 99%
“…The existence of the external monitor threads and their scheduling is ensured by a self-stabilizing OS [11] and by the framework of the self-stabilizing autonomic recoverer [4]. The external monitor of the subsystem repeatedly checks the subsystem recovery tuples.…”
Section: Recovery Oriented Programmingmentioning
confidence: 99%
“…The consumer thread (sub 2 ) and the queue object (sub 3 ) form subsystem sub 5 . The subsystem sub 4 and sub 5 form the subsystem sub 6 . The subsystems configuration graph G for the system is presented in Figure 3.…”
Section: Producer-consumer Examplementioning
confidence: 99%
See 2 more Smart Citations