Setting up a security perimeter for distributed networks
โ Scribed by Helen Meyer
- Publisher
- Elsevier Science
- Year
- 1996
- Tongue
- English
- Weight
- 134 KB
- Volume
- 15
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
ever-increasing birthrate of computer viruses. The IBM team draws inspiration from biology to understand how computer viruses spread and to craft the technology to deal with them.
๐ SIMILAR VOLUMES
This paper introduces the novel concept of streaming worms and applies the concept to secure parallel file transfer. A streaming worm (sworm) is a powerful class of software that can replicate itself as well as a chunk of arbitrary payload code on a predetermined set of nodes in a network very quick
The general concept of security in message communications may be traced to the advent of human civilization. In contrast, however, security in automation and control is a recent phenomenon, originating with the computer age and is rapidly gaining importance with the proliferation of networks. With c
This paper presents a broadcast-based election protocol for distributed systems implemented on unreliable networks. The protocol is highly robust, tolerating failures such as message loss and network partitioning. Our protocol is different from others in that it effectively detects events that may p