I. Agi and L. Gong, An empirical study of secure MPEG video transmissions, Proceedings of Internet Society Symposium on Network and Distributed Systems Security, pp.137-144, 1996.
DOI : 10.1109/NDSS.1996.492420

D. G. Andersen, Mayday: Distributed filtering for internet services, 4th USENIX Symposium on Internet Technologies and Systems, 2003.

A. Avi?ienis, J. C. Laprie, B. Randell, and C. E. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

E. Barka and M. Boulmalf, On the Impact of Security on the Performance of WLANs, Journal of Communications, vol.2, issue.4, pp.10-17, 2007.
DOI : 10.4304/jcm.2.4.10-17

K. Bauer, D. Mccoy, D. Grunwald, T. Kohno, and D. Sicker, Low-resource routing attacks against tor, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, pp.11-20, 2007.
DOI : 10.1145/1314333.1314336

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.9042

Y. Chen and Z. He, Simulating highly dependable applications in a distributed computing environment, ANSS '03: Proceedings of the 36th annual symposium on Simulation. p. 101, 2003.

B. Cho, H. Youn, E. Lee, G. Lee, D. Howard et al., Performability analysis method from reliability and availability, Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT '09, pp.401-407, 2009.
DOI : 10.1145/1644993.1645067

V. Cortellessa, C. Trubiani, L. Mostarda, and N. Dulay, An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance, ) ISARCS. LNCS, pp.1-18, 2010.
DOI : 10.1007/978-3-642-13556-9_1

C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole et al., Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks, SSYM'98: Proceedings of the 7th USENIX Security Symposium. pp. 5?5. USENIX Association, 1998.

Y. Deswarte, L. Blain, and J. C. Fabre, Intrusion tolerance in distributed computing systems, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp.110-121, 1991.
DOI : 10.1109/RISP.1991.130780

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.9968

J. Fraga and D. Powell, A fault-and intrusion-tolerant file system, Proceedings of the 3rd Intl. Conf. on Computer Security, pp.203-218, 1985.

M. A. Haleem, C. N. Mathur, R. Chandramouli, and K. P. Subbalakshmi, Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.4, pp.313-324, 2007.
DOI : 10.1109/TDSC.2007.70214

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.329.4220&rep=rep1&type=pdf

S. Hariri and H. Mutlu, Hierarchical modeling of availability in distributed systems, IEEE Transactions on Software Engineering, vol.21, issue.1, pp.50-58, 1995.
DOI : 10.1109/32.341847

M. Kaaniche, K. Kanoun, and M. Rabah, A framework for modeling availability of ebusiness systems, Computer Communications and Networks Proceedings. Tenth Intl. Conf. on, pp.40-45, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01212216

I. E. Komari, V. Kharchenko, I. Lysenko, E. Babeshko, and A. Romanovsky, Diversity and security of computing systems: Points of interconnection. part 2: Methodology and case study, MASAUM Journal of Open Problems in Science and Engineering, vol.1, issue.2, pp.33-41, 2009.

I. E. Komari, V. Kharchenko, A. Romanovsky, and E. Babeshko, Diversity and security of computing systems: Points of interconnection. part 1: Introduction to methodology, MASAUM Journal of Open Problems in Science and Engineering, vol.1, issue.2, pp.28-32, 2009.

. Laprie, Dependability: Basic Concepts and Terminology, 1992.
DOI : 10.1007/978-3-7091-9170-5_1

B. Littlewood and L. Strigini, Redundancy and Diversity in Security, LNCS, vol.3193, pp.423-438, 2004.
DOI : 10.1007/978-3-540-30108-0_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.2075

V. Mainkar, Availability analysis of transaction processing systems based on userperceived performance, SRDS '97: Proceedings of the 16th Symposium on Reliable Distributed Systems, p.10, 1997.

J. F. Meyer, On Evaluating the Performability of Degradable Computing Systems, IEEE Transactions on Computers, vol.29, issue.8, pp.720-731, 1980.
DOI : 10.1109/TC.1980.1675654

J. F. Meyer, Performability: a retrospective and some pointers to the future, Performance Evaluation, vol.14, issue.3-4, pp.139-156, 1992.
DOI : 10.1016/0166-5316(92)90002-X

L. Shao, J. Zhao, T. Xie, L. Zhang, B. Xie et al., User-Perceived Service Availability: A Metric and an Estimation Approach, 2009 IEEE International Conference on Web Services, pp.647-654, 2009.
DOI : 10.1109/ICWS.2009.58

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.1604

R. Snader and N. Borisov, A tune-up for tor: Improving security and performance in the tor network, 2008.

G. Starnberger, L. Froihofer, and K. M. Goeschka, Distributed timestamping with smart cards using efficient overlay routing, Fifth Intl. Conf. for Internet Technology and Secured Transactions, 2010.

G. Starnberger, L. Froihofer, and K. M. Goeschka, Adaptive run-time performance optimization through scalable client request rate control, Proc. 2nd Joint WOSP/SIPEW Intl. Conf. on Performance Engineering
DOI : 10.1145/1958746.1958773

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3865

G. Starnberger, L. Froihofer, and K. M. Goeschka, A Generic Proxy for Secure Smart Card-Enabled Web Applications, Web Engineering, 10th Intl. Conf., ICWE 2010, pp.370-384, 2010.
DOI : 10.1007/978-3-642-13911-6_25

G. Starnberger, L. Froihofer, and K. M. Goeschka, Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients, 2010 International Conference on Availability, Reliability and Security, pp.96-103, 2010.
DOI : 10.1109/ARES.2010.78

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.627.9110

B. Timmerman, A security model for dynamic adaptive traffic masking, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.107-116
DOI : 10.1145/283699.283748

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.8187

P. Veríssimo, N. F. Neves, C. Cachin, J. A. Poritz, D. Powell et al., Intrusion-tolerant middleware: the road to automatic security, IEEE Security & Privacy Magazine, vol.4, issue.4, pp.54-62, 2006.
DOI : 10.1109/MSP.2006.95

P. Veríssimo, N. F. Neves, and M. Correia, Intrusion-Tolerant Architectures: Concepts and Design, Architecting Dependable Systems, pp.3-36, 2003.
DOI : 10.1007/3-540-45177-3_1

D. Wang and K. S. Trivedi, Modeling User-Perceived Service Availability, ) ISAS. LNCS, pp.107-122, 2005.
DOI : 10.1007/11560333_10

K. Wolter and P. Reinecke, Performance and Security Tradeoff, ) SFM. LNCS, pp.135-167, 2010.
DOI : 10.1007/3-540-46429-8_14

W. Xie, H. Sun, Y. Cao, and K. Trivedi, Modeling of user perceived webserver availability, Communications, 2003. ICC '03. IEEE Intl. Conf. on, pp.1796-1800, 2003.