H. Abu-amara and J. Lokre, Election in asynchronous complete networks with intermittent link failures, IEEE Transactions on Computers, vol.43, issue.7, pp.778-788, 1994.
DOI : 10.1109/12.293257

E. Al-shaer, Toward Network Configuration Randomization for Moving Target Defense, pp.153-159, 2011.
DOI : 10.1007/978-1-4614-0977-9_9

J. Anderson, Computer Security Technology Planning Study, 1974.
DOI : 10.21236/ad0772806

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=AD0772806&Location=U2&doc=GetTRDoc.pdf

S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis, Defending against hitlist worms using network address space randomization, Computer Networks, vol.51, issue.12, pp.3471-3490, 2007.
DOI : 10.1016/j.comnet.2007.02.006

A. Arghavani, E. Ahmadi, and A. Haghighat, Improved bully election algorithm in distributed systems, ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia, pp.1-6, 2011.
DOI : 10.1109/ICIMU.2011.6122724

J. Brunekreef, J. P. Katoen, R. Koymans, and S. Mauw, Design and analysis of dynamic leader election protocols in broadcast networks, Distributed Computing, vol.24, issue.4, p.157, 1996.
DOI : 10.1109/ICDCS.1991.148712

M. Burrows, The chubby lock service for loosely-coupled distributed systems, Proceedings of the 7th symposium on Operating systems design and implementation, pp.335-350, 2006.

M. Castro and B. Liskov, Practical byzantine fault tolerance and proactive recovery, ACM Transactions on Computer Systems, vol.20, issue.4, pp.398-461, 2002.
DOI : 10.1145/571637.571640

M. Castro and B. Liskov, Practical byzantine fault tolerance, In: OSDI, vol.99, pp.173-186, 1999.

M. D. Compton, Improving the quality of service and security of military networks with a network tasking order process, 2010.

C. Copeland and H. Zhong, Tangaroa: a byzantine fault tolerant raft

D. Evans, A. Nguyen-tuong, and J. Knight, Effectiveness of Moving Target Defenses, Moving Target Defense, pp.29-48, 2011.
DOI : 10.1007/978-1-4614-0977-9_2

URL : http://www.sds.lcs.mit.edu/%7Eevs/pubs/mt2011/mt2011.pdf

D. Ferraiolo, J. Cugini, and D. R. Kuhn, Role-based access control (rbac): Features and motivations, Proceedings of 11th annual computer security application conference, pp.241-289, 1995.

A. Ferreira, D. Chadwick, P. Farinha, R. Correia, G. Zao et al., How to Securely Break into RBAC: The BTG-RBAC Model, 2009 Annual Computer Security Applications Conference, pp.23-31, 2009.
DOI : 10.1109/ACSAC.2009.12

URL : http://kar.kent.ac.uk/31989/1/ACSACfinalSubmitted.pdf

L. J. Fraim, Scomp: A Solution to the Multilevel Security Problem, Computer, vol.16, issue.7, pp.26-34, 1983.
DOI : 10.1109/MC.1983.1654440

H. Garcia-molina, Elections in a Distributed Computing System, IEEE Transactions on Computers, vol.31, issue.1, pp.48-59, 1982.
DOI : 10.1109/TC.1982.1675885

M. D. Gilbert, An examination of federal and commercial access control policy needs, National Computer Security Conference16th) Proceedings: Information Systems Security: User Choices, p.107, 1993.

E. Guttman, Service location protocol: automatic discovery of IP network services, IEEE Internet Computing, vol.3, issue.4, pp.71-80, 1999.
DOI : 10.1109/4236.780963

Y. Han, W. Lu, and S. Xu, Characterizing the power of moving target defense via cyber epidemic dynamics, Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS '14, p.10, 2014.
DOI : 10.1145/2600176.2600180

H. Howard, M. Schwarzkopf, A. Madhavapeddy, and J. Crowcroft, Raft Refloated, ACM SIGOPS Operating Systems Review, vol.49, issue.1, pp.12-21, 2015.
DOI : 10.1109/MSP.2009.932122

J. H. Huh, R. B. Bobba, T. Markham, D. M. Nicol, J. Hull et al., Next-Generation Access Control for Distributed Control Systems, IEEE Internet Computing, vol.20, issue.5, pp.28-37, 2016.
DOI : 10.1109/MIC.2016.105

P. Hunt, M. Konar, F. P. Junqueira, and B. Reed, Zookeeper: Wait-free coordination for internetscale systems, USENIX annual technical conference, p.9, 2010.

A. Inc, Bonjour. https://support.apple.com/bonjour, accessed: 2017-02-26 24, pp.2017-2019, 2012.

X. Info, Wso2 identity server, pp.2017-2019

V. King, J. Saia, V. Sanwalani, and E. Vee, Scalable leader election, Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm , SODA '06, 2006.
DOI : 10.1145/1109557.1109667

V. King, J. Saia, V. Sanwalani, and E. Vee, Scalable leader election, Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm , SODA '06, pp.990-999, 2006.
DOI : 10.1145/1109557.1109667

L. Lamport, The part-time parliament, ACM Transactions on Computer Systems, vol.16, issue.2, pp.133-169, 1998.
DOI : 10.1145/279227.279229

L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982.
DOI : 10.1145/357172.357176

URL : http://www.cs.wisc.edu/~bart/739/papers/byzantine.pdf

L. Lamport, Paxos made simple, ACM Sigact News, vol.32, issue.4, pp.18-25, 2001.

L. Lann and G. , Distributed systems-towards a formal approach, IFIP Congress, pp.155-160, 1977.

J. P. Martin and L. Alvisi, Fast Byzantine Consensus, IEEE Transactions on Dependable and Secure Computing, vol.3, issue.3, pp.202-215, 2006.
DOI : 10.1109/TDSC.2006.35

I. Mohammed and D. M. Dilts, Design for dynamic user-role-based security, Computers & Security, vol.13, issue.8, pp.661-671, 1994.
DOI : 10.1016/0167-4048(94)90048-5

. Openslp, Service location protocol, pp.2017-2019

C. Perkins and S. Kaplan, Service location protocol, ACTS Mobile Networking Summit/MMITS Software Radio Workshop, 1999.

C. E. Perkins, Dhcp options for service location protocol, 1999.
DOI : 10.17487/rfc2610

E. Rissanen, extensible access control markup language (xacml) version 3, 2013.

S. Ruj, M. Stojmenovic, and A. Nayak, Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.2, pp.384-394, 2014.
DOI : 10.1109/TPDS.2013.38

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf

R. S. Sandhu and P. Samarati, Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994.
DOI : 10.1109/35.312842

H. M. Sayeed, M. Abu-amara, and H. Abu-amara, Optimal asynchronous agreement and leader election algorithm for complete networks with Byzantine faulty links, Distributed Computing, vol.27, issue.3, pp.147-156, 1995.
DOI : 10.1109/ICDCS.1991.148712

R. Schell, T. Tao, and M. Heckman, Designing the GEMSOS Security Kernel for Security and Performance, Proceedings of the 8th National Computer Security Conference, 1985.

X. Shi, H. Lin, H. Jin, B. B. Zhou, Z. Yin et al., GIRAFFE: A scalable distributed coordination service for large-scale systems, 2014 IEEE International Conference on Cluster Computing (CLUSTER), pp.38-47, 2014.
DOI : 10.1109/CLUSTER.2014.6968766

G. Singh, Leader election in the presence of link failures, IEEE Transactions on Parallel and Distributed Systems, vol.7, issue.3, pp.231-236, 1996.
DOI : 10.1109/71.491576

P. B. Soundarabai, J. Thriveni, H. Manjunatha, K. Venugopal, and L. Patnaik, Message Efficient Ring Leader Election in Distributed Systems, Computer Networks & Communications (NetCom), pp.835-843, 2013.
DOI : 10.1007/978-1-4614-6154-8_81

J. Perkins and C. E. , The TrustedBSD Project: Trustedbsd. http://www, 1997.

G. Wang, J. Koshy, S. Subramanian, K. Paramasivam, M. Zadeh et al., Building a replicated logging system with Apache Kafka, Proceedings of the VLDB Endowment, pp.1654-1655, 2015.
DOI : 10.14778/2824032.2824063

C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-hartman, Linux security modules: general security support for the linux kernel, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], 2002.
DOI : 10.1109/FITS.2003.1264934

J. Xu, P. Guo, M. Zhao, R. F. Erbacher, M. Zhu et al., Comparing Different Moving Target Defense Techniques, Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, pp.97-107, 2014.
DOI : 10.1145/1297105.1297072

R. Zhuang, S. A. Deloach, and X. Ou, Towards a Theory of Moving Target Defense, Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, pp.31-40, 2014.
DOI : 10.1504/IJICS.2007.012248