Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance Methods

Borrowing from well known fault tolerant approaches based on redundancy to mask the effect of faults, redundancy-based intrusion tolerance schemes are proposed in this paper, where redundancy of ICT components is exploited as a first defense line against a subset of compromised components within the...

Full description

Bibliographic Details
Main Authors: Di Giandomenico Felicita, Masetti Giulio, Chiaradonna Silvano
Format: Article
Language:English
Published: Sciendo 2022-12-01
Series:International Journal of Applied Mathematics and Computer Science
Subjects:
Online Access:https://doi.org/10.34768/amcs-2022-0048