Secure system architecture based on dynamic resource reallocation

2Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A secure system architecture using a two-level approach is presented in this paper. At the node level, by means of dynamic resource reallocation within a computing node, the critical services previously selected are to survive even after the occurrence of an attack. If it becomes impossible to find enough resources for the services within the node in spite of the adaptive actions taken at the node level, it moves to the system level. The system level mechanism is to deliver the intended services transparently to the clients even when a node fails by means of inter-node resource reallocation. An architecture adopting diverse redundant computing nodes is proposed for that purpose. Through the experiments on a test-bed, especially, for web services, the approach turned out very effective to cope with not only denial of service attacks but also confidentiality and integrity attacks. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Min, B. J., Kim, S. K., & Choi, J. S. (2004). Secure system architecture based on dynamic resource reallocation. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2908, 174–187. https://doi.org/10.1007/978-3-540-24591-9_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free