2001
DOI: 10.1016/s1389-1286(00)00179-1
|View full text |Cite
|
Sign up to set email alerts
|

The Ninja architecture for robust Internet-scale systems and services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
86
0
2

Year Published

2003
2003
2007
2007

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 224 publications
(92 citation statements)
references
References 18 publications
0
86
0
2
Order By: Relevance
“…End-hosts employ other forms of adaptations to ensure scalability [8], [9], [10], [11], [12], [13], [14], [15]. Load balancing is just another form of an adaptation policy that could be exploited using RoQ attacks.…”
Section: Load Balancing and Profiling As Targets Of Roq Exploitsmentioning
confidence: 99%
“…End-hosts employ other forms of adaptations to ensure scalability [8], [9], [10], [11], [12], [13], [14], [15]. Load balancing is just another form of an adaptation policy that could be exploited using RoQ attacks.…”
Section: Load Balancing and Profiling As Targets Of Roq Exploitsmentioning
confidence: 99%
“…Scout OS [8] defines a path abstraction to navigate through the layers of the network stack and the Ninja project [7] utilizes a path abstraction as a way to compose multiple services distributed on the Internet into a single logical unit. Our work is inspired by the use of paths in these various contexts.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, a Ninja [21] "base" provides an execution environment that automatically scales service functionality for both performance and fault tolerance. The base requires services to be programmed to a specialized event-based model, and distributes services across a cluster of workstations.…”
Section: Isolated Execution Environmentsmentioning
confidence: 99%