Verıssimo et al., 2001 - Google Patents
Service and Protocol Architecture for the MAFTIA MiddlewareVerıssimo et al., 2001
View PDF- Document ID
- 14454250868390189982
- Author
- Verıssimo P
- Neves N
- Publication year
- Publication venue
- Deliverable D23, Project MAFTIA IST-1999-11583
External Links
Snippet
This document describes the specification of the MAFTIA middleware architecture. This specification focusses on the models, building blocks and services. It describes the tradeoffs made in terms of models, the choices of building blocks and their topology, and the portfolio …
- 230000000694 effects 0 abstract description 29
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/56—Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Veríssimo et al. | Intrusion-tolerant architectures: Concepts and design | |
Cachin et al. | Introduction to reliable and secure distributed programming | |
Gong | Increasing availability and security of an authentication service | |
Bhargavan et al. | Cryptographic protocol synthesis and verification for multiparty sessions | |
Cachin | Distributing trust on the Internet | |
US20030126464A1 (en) | Method and system for determining and enforcing security policy in a communication session | |
Karbasi et al. | A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks | |
Focardi et al. | Classification of Security Properties: (Part II: Network Security) | |
Fort et al. | TrustedPals: Secure multiparty computation implemented with smart cards | |
Smith et al. | Signed vector timestamps: A secure protocol for partial order time | |
Yandamuri et al. | Communication-efficient BFT using small trusted hardware to tolerate minority corruption | |
Hiltunen et al. | Enhancing survivability of security services using redundancy | |
Bugliesi et al. | Dynamic types for authentication | |
Verıssimo et al. | Service and Protocol Architecture for the MAFTIA Middleware | |
Pfitzmann | Service and Protocol Architecture for the MAFTIA Middleware | |
Ma et al. | Security modeling and analysis of mobile agent systems | |
Randell et al. | Distributed secure systems: Then and now | |
Cachin | Specification of dependable trusted third parties | |
McDaniel et al. | Antigone: Implementing policy in secure group communication | |
Leiwo et al. | A security design for a wide-area distributed system | |
Kihlstrom | Survivable distributed systems: Design and implementation | |
Neves et al. | First Specification of APIs and Protocols for the MAFTIA Middleware | |
Madsen | Securing Distributed Business Process Model Execution | |
Correia | Intrusion tolerance based on architectural hybridization | |
Bodei et al. | Primitives for Authentication in Process Algebras |