An empirical study of secure MPEG video transmissions, Proceedings of Internet Society Symposium on Network and Distributed Systems Security, pp.137-144, 1996. ,
DOI : 10.1109/NDSS.1996.492420
Mayday: Distributed filtering for internet services, 4th USENIX Symposium on Internet Technologies and Systems, 2003. ,
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
On the Impact of Security on the Performance of WLANs, Journal of Communications, vol.2, issue.4, pp.10-17, 2007. ,
DOI : 10.4304/jcm.2.4.10-17
Low-resource routing attacks against tor, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, pp.11-20, 2007. ,
DOI : 10.1145/1314333.1314336
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.9042
Simulating highly dependable applications in a distributed computing environment, ANSS '03: Proceedings of the 36th annual symposium on Simulation. p. 101, 2003. ,
Performability analysis method from reliability and availability, Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT '09, pp.401-407, 2009. ,
DOI : 10.1145/1644993.1645067
An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance, ) ISARCS. LNCS, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-13556-9_1
Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks, SSYM'98: Proceedings of the 7th USENIX Security Symposium. pp. 5?5. USENIX Association, 1998. ,
Intrusion tolerance in distributed computing systems, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp.110-121, 1991. ,
DOI : 10.1109/RISP.1991.130780
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.9968
A fault-and intrusion-tolerant file system, Proceedings of the 3rd Intl. Conf. on Computer Security, pp.203-218, 1985. ,
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.4, pp.313-324, 2007. ,
DOI : 10.1109/TDSC.2007.70214
URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.329.4220&rep=rep1&type=pdf
Hierarchical modeling of availability in distributed systems, IEEE Transactions on Software Engineering, vol.21, issue.1, pp.50-58, 1995. ,
DOI : 10.1109/32.341847
A framework for modeling availability of ebusiness systems, Computer Communications and Networks Proceedings. Tenth Intl. Conf. on, pp.40-45, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01212216
Diversity and security of computing systems: Points of interconnection. part 2: Methodology and case study, MASAUM Journal of Open Problems in Science and Engineering, vol.1, issue.2, pp.33-41, 2009. ,
Diversity and security of computing systems: Points of interconnection. part 1: Introduction to methodology, MASAUM Journal of Open Problems in Science and Engineering, vol.1, issue.2, pp.28-32, 2009. ,
Dependability: Basic Concepts and Terminology, 1992. ,
DOI : 10.1007/978-3-7091-9170-5_1
Redundancy and Diversity in Security, LNCS, vol.3193, pp.423-438, 2004. ,
DOI : 10.1007/978-3-540-30108-0_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.2075
Availability analysis of transaction processing systems based on userperceived performance, SRDS '97: Proceedings of the 16th Symposium on Reliable Distributed Systems, p.10, 1997. ,
On Evaluating the Performability of Degradable Computing Systems, IEEE Transactions on Computers, vol.29, issue.8, pp.720-731, 1980. ,
DOI : 10.1109/TC.1980.1675654
Performability: a retrospective and some pointers to the future, Performance Evaluation, vol.14, issue.3-4, pp.139-156, 1992. ,
DOI : 10.1016/0166-5316(92)90002-X
User-Perceived Service Availability: A Metric and an Estimation Approach, 2009 IEEE International Conference on Web Services, pp.647-654, 2009. ,
DOI : 10.1109/ICWS.2009.58
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.1604
A tune-up for tor: Improving security and performance in the tor network, 2008. ,
Distributed timestamping with smart cards using efficient overlay routing, Fifth Intl. Conf. for Internet Technology and Secured Transactions, 2010. ,
Adaptive run-time performance optimization through scalable client request rate control, Proc. 2nd Joint WOSP/SIPEW Intl. Conf. on Performance Engineering ,
DOI : 10.1145/1958746.1958773
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3865
A Generic Proxy for Secure Smart Card-Enabled Web Applications, Web Engineering, 10th Intl. Conf., ICWE 2010, pp.370-384, 2010. ,
DOI : 10.1007/978-3-642-13911-6_25
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients, 2010 International Conference on Availability, Reliability and Security, pp.96-103, 2010. ,
DOI : 10.1109/ARES.2010.78
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.627.9110
A security model for dynamic adaptive traffic masking, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.107-116 ,
DOI : 10.1145/283699.283748
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.8187
Intrusion-tolerant middleware: the road to automatic security, IEEE Security & Privacy Magazine, vol.4, issue.4, pp.54-62, 2006. ,
DOI : 10.1109/MSP.2006.95
Intrusion-Tolerant Architectures: Concepts and Design, Architecting Dependable Systems, pp.3-36, 2003. ,
DOI : 10.1007/3-540-45177-3_1
Modeling User-Perceived Service Availability, ) ISAS. LNCS, pp.107-122, 2005. ,
DOI : 10.1007/11560333_10
Performance and Security Tradeoff, ) SFM. LNCS, pp.135-167, 2010. ,
DOI : 10.1007/3-540-46429-8_14
Modeling of user perceived webserver availability, Communications, 2003. ICC '03. IEEE Intl. Conf. on, pp.1796-1800, 2003. ,