2009
DOI: 10.1109/tdsc.2008.1
|View full text |Cite
|
Sign up to set email alerts
|

The Design of a Generic Intrusion-Tolerant Architecture for Web Servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(30 citation statements)
references
References 10 publications
0
29
0
Order By: Relevance
“…The generic architecture for an intrusion-tolerant system consists of various Web servers and proxies [11]. Duplicated Web servers provide the same services but manage different applications and OS on different hardware platforms.…”
Section: Related Workmentioning
confidence: 99%
“…The generic architecture for an intrusion-tolerant system consists of various Web servers and proxies [11]. Duplicated Web servers provide the same services but manage different applications and OS on different hardware platforms.…”
Section: Related Workmentioning
confidence: 99%
“…First, Web technologies have been applied to a wide range of fields from commercial to military systems. Therefore, protecting Web servers has been one of the most interesting topics in ITS studies [6], [7]. Second, the types of software that are used to provide Web services provide an opportunity for diversity.…”
Section: Copyright C 2017 the Institute Of Electronics Information Amentioning
confidence: 99%
“…A generic architecture for intrusion-tolerant Web servers is composed of redundant Web servers and proxies [7]. The authors used diversification to increase resilience to attacks and independence between redundant components.…”
Section: Related Workmentioning
confidence: 99%
“…Considering that a storage service may be operated in a oneupload-many-download manner, this advantage is an important feature. In addition, this concept might also have something in common with intrusion tolerant systems (ITSs) [22,23] in which data leakage is possible during exposure time of virtual machines allowing an adversary to get sensitive data from information systems. They present their contributions below:…”
Section: Privacy Of the Retrievermentioning
confidence: 99%