Election in asynchronous complete networks with intermittent link failures, IEEE Transactions on Computers, vol.43, issue.7, pp.778-788, 1994. ,
DOI : 10.1109/12.293257
Toward Network Configuration Randomization for Moving Target Defense, pp.153-159, 2011. ,
DOI : 10.1007/978-1-4614-0977-9_9
Computer Security Technology Planning Study, 1974. ,
DOI : 10.21236/ad0772806
URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=AD0772806&Location=U2&doc=GetTRDoc.pdf
Defending against hitlist worms using network address space randomization, Computer Networks, vol.51, issue.12, pp.3471-3490, 2007. ,
DOI : 10.1016/j.comnet.2007.02.006
Improved bully election algorithm in distributed systems, ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia, pp.1-6, 2011. ,
DOI : 10.1109/ICIMU.2011.6122724
Design and analysis of dynamic leader election protocols in broadcast networks, Distributed Computing, vol.24, issue.4, p.157, 1996. ,
DOI : 10.1109/ICDCS.1991.148712
The chubby lock service for loosely-coupled distributed systems, Proceedings of the 7th symposium on Operating systems design and implementation, pp.335-350, 2006. ,
Practical byzantine fault tolerance and proactive recovery, ACM Transactions on Computer Systems, vol.20, issue.4, pp.398-461, 2002. ,
DOI : 10.1145/571637.571640
Practical byzantine fault tolerance, In: OSDI, vol.99, pp.173-186, 1999. ,
Improving the quality of service and security of military networks with a network tasking order process, 2010. ,
Tangaroa: a byzantine fault tolerant raft ,
Effectiveness of Moving Target Defenses, Moving Target Defense, pp.29-48, 2011. ,
DOI : 10.1007/978-1-4614-0977-9_2
URL : http://www.sds.lcs.mit.edu/%7Eevs/pubs/mt2011/mt2011.pdf
Role-based access control (rbac): Features and motivations, Proceedings of 11th annual computer security application conference, pp.241-289, 1995. ,
How to Securely Break into RBAC: The BTG-RBAC Model, 2009 Annual Computer Security Applications Conference, pp.23-31, 2009. ,
DOI : 10.1109/ACSAC.2009.12
URL : http://kar.kent.ac.uk/31989/1/ACSACfinalSubmitted.pdf
Scomp: A Solution to the Multilevel Security Problem, Computer, vol.16, issue.7, pp.26-34, 1983. ,
DOI : 10.1109/MC.1983.1654440
Elections in a Distributed Computing System, IEEE Transactions on Computers, vol.31, issue.1, pp.48-59, 1982. ,
DOI : 10.1109/TC.1982.1675885
An examination of federal and commercial access control policy needs, National Computer Security Conference16th) Proceedings: Information Systems Security: User Choices, p.107, 1993. ,
Service location protocol: automatic discovery of IP network services, IEEE Internet Computing, vol.3, issue.4, pp.71-80, 1999. ,
DOI : 10.1109/4236.780963
Characterizing the power of moving target defense via cyber epidemic dynamics, Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS '14, p.10, 2014. ,
DOI : 10.1145/2600176.2600180
Raft Refloated, ACM SIGOPS Operating Systems Review, vol.49, issue.1, pp.12-21, 2015. ,
DOI : 10.1109/MSP.2009.932122
Next-Generation Access Control for Distributed Control Systems, IEEE Internet Computing, vol.20, issue.5, pp.28-37, 2016. ,
DOI : 10.1109/MIC.2016.105
Zookeeper: Wait-free coordination for internetscale systems, USENIX annual technical conference, p.9, 2010. ,
Bonjour. https://support.apple.com/bonjour, accessed: 2017-02-26 24, pp.2017-2019, 2012. ,
Wso2 identity server, pp.2017-2019 ,
Scalable leader election, Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm , SODA '06, 2006. ,
DOI : 10.1145/1109557.1109667
Scalable leader election, Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm , SODA '06, pp.990-999, 2006. ,
DOI : 10.1145/1109557.1109667
The part-time parliament, ACM Transactions on Computer Systems, vol.16, issue.2, pp.133-169, 1998. ,
DOI : 10.1145/279227.279229
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982. ,
DOI : 10.1145/357172.357176
URL : http://www.cs.wisc.edu/~bart/739/papers/byzantine.pdf
Paxos made simple, ACM Sigact News, vol.32, issue.4, pp.18-25, 2001. ,
Distributed systems-towards a formal approach, IFIP Congress, pp.155-160, 1977. ,
Fast Byzantine Consensus, IEEE Transactions on Dependable and Secure Computing, vol.3, issue.3, pp.202-215, 2006. ,
DOI : 10.1109/TDSC.2006.35
Design for dynamic user-role-based security, Computers & Security, vol.13, issue.8, pp.661-671, 1994. ,
DOI : 10.1016/0167-4048(94)90048-5
Service location protocol, pp.2017-2019 ,
Service location protocol, ACTS Mobile Networking Summit/MMITS Software Radio Workshop, 1999. ,
Dhcp options for service location protocol, 1999. ,
DOI : 10.17487/rfc2610
extensible access control markup language (xacml) version 3, 2013. ,
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, pp.384-394, 2014. ,
DOI : 10.1109/TPDS.2013.38
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf
Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994. ,
DOI : 10.1109/35.312842
Optimal asynchronous agreement and leader election algorithm for complete networks with Byzantine faulty links, Distributed Computing, vol.27, issue.3, pp.147-156, 1995. ,
DOI : 10.1109/ICDCS.1991.148712
Designing the GEMSOS Security Kernel for Security and Performance, Proceedings of the 8th National Computer Security Conference, 1985. ,
GIRAFFE: A scalable distributed coordination service for large-scale systems, 2014 IEEE International Conference on Cluster Computing (CLUSTER), pp.38-47, 2014. ,
DOI : 10.1109/CLUSTER.2014.6968766
Leader election in the presence of link failures, IEEE Transactions on Parallel and Distributed Systems, vol.7, issue.3, pp.231-236, 1996. ,
DOI : 10.1109/71.491576
Message Efficient Ring Leader Election in Distributed Systems, Computer Networks & Communications (NetCom), pp.835-843, 2013. ,
DOI : 10.1007/978-1-4614-6154-8_81
The TrustedBSD Project: Trustedbsd. http://www, 1997. ,
Building a replicated logging system with Apache Kafka, Proceedings of the VLDB Endowment, pp.1654-1655, 2015. ,
DOI : 10.14778/2824032.2824063
Linux security modules: general security support for the linux kernel, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], 2002. ,
DOI : 10.1109/FITS.2003.1264934
Comparing Different Moving Target Defense Techniques, Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, pp.97-107, 2014. ,
DOI : 10.1145/1297105.1297072
Towards a Theory of Moving Target Defense, Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, pp.31-40, 2014. ,
DOI : 10.1504/IJICS.2007.012248