نتایج جستجو برای: based logging systems

تعداد نتایج: 3741169  

Journal: :Security and Communication Networks 2015
Panos Kampanakis Attila Altay Yavuz

Audit logs provide information about historical states of computer systems. They also contain highly valuable data that can be used by law enforcement in forensic investigations. Thus, ensuring the authenticity and integrity of audit logs is of vital importance. An ideal security mechanism for audit logging must also satisfy security properties such as forwardsecurity (compromise resiliency), c...

Journal: :J. Algorithms 1990
David B. Johnson Willy Zwaenepoel

In a distributed system using message logging and checkpointing to provide fault tolerance there is always a unique maximum recoverable system state regardless of the message logging protocol used The proof of this relies on the observation that the set of system states that have occurred during any single execution of a system forms a lattice with the sets of consistent and recoverable system ...

1987
David B. Johnson Willy Zwaenepoel

Sender based message logging is a new low overhead mech anism for providing transparent fault tolerance in dis tributed systems It di ers from conventional message log ging mechanisms in that each message is logged in volatile memory on the machine from which the message is sent Keeping the message log in the sender s local memory allows us to recover from a single failure at a time with out th...

1993
Stephen E. Hansen E. Todd Atkins

This paper describes an approach to monitoring events on a large number of servers and workstations. While modern UNIX systems are capable of logging a variety of information concerning the health and status of their hardware and operating system software, they are generally not configured to do so. Even when this information is logged, it is often hidden in places that are either not monitored...

2006
Rafael Accorsi

We investigate a mechanism for secure remote logging to improve privacy guarantees in dynamic systems. Considering an extended threat model for privacy, we first describe outer and inner privacy: outer privacy expresses the traditional attacker model for privacy where identity management systems control the collection of personal, observable information; inner privacy denotes the threat posed b...

Journal: :Int. J. Web Service Res. 2010
Christoph Ringelstein Steffen Staab

Service-oriented systems facilitate business workflows to span multiple organizations (e.g., by means of Web services). As a side effect, data may be more easily transferred over organizational boundaries. Thus, privacy issues arise. At the same time, there are personal, business and legal requirements for protecting privacy and IPR and allowing customers to request information about how and by...

2013
YU ZHANG KE XIONG DANDAN LI ZHENGDING QIU

The Measurement/Logging While Drilling (M/LWD) system is a kind of sensors system which is used to help oil/gas drilling field technicians to steer well drilling. In M/LWD, several kinds of sensors are installed into drill string to measure the underground logging data during well drilling operations, and a sink within the drill string collects the logging data from the sensors and then transmi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی صنعتی کرمان - پژوهشکده برق و کامپیوتر 1390

a phase-locked loop (pll) based frequency synthesizer is an important circuit that is used in many applications, especially in communication systems such as ethernet receivers, disk drive read/write channels, digital mobile receivers, high-speed memory interfaces, system clock recovery and wireless communication system. other than requiring good signal purity such as low phase noise and low spu...

1990
David B Johnson Willy Zwaenepoel

Although optimistic fault tolerance methods using message logging and checkpointing have the potential to provide highly e cient transparent fault tolerance in distributed systems existing methods are limited by several factors Coordinating the asynchronous message logging progress among all processes of the system may cause signi cant over head limiting their ability to scale to large systems ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید