scholarly journals A Fault-oblivious Extreme-scale Execution Environment

2016 ◽  
Author(s):  
Ponnuswamy Sadayappan
2013 ◽  
Author(s):  
Eric Van Hensbergen ◽  
William Speight ◽  
Jimi Xenidis

Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


2009 ◽  
Vol 46 (1) ◽  
pp. 71-82 ◽  
Author(s):  
Min Zhou ◽  
Onkar Sahni ◽  
H. Jin Kim ◽  
C. Alberto Figueroa ◽  
Charles A. Taylor ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document