Abstract is missing.
- A churn-resistant peer-to-peer web caching systemPrakash Linga, Indranil Gupta, Ken Birman. 1-10 [doi]
- A holistic approach to service survivabilityAngelos D. Keromytis, Janak J. Parekh, Philip Gross, Gail E. Kaiser, Vishal Misra, Jason Nieh, Dan Rubenstein, Salvatore J. Stolfo. 11-22 [doi]
- Security analysis of SITAR intrusion tolerance systemDazhi Wang, Bharat B. Madan, Kishor S. Trivedi. 23-32 [doi]
- SelectCast: a scalable and self-repairing multicast overlay routing facilityAdrian Bozdog, Robbert van Renesse, Dan Dumitriu. 33-42 [doi]
- Tolerating denial-of-service attacks using overlay networks: impact of topologyJu Wang 0010, Linyuan Lu, Andrew A. Chien. 43-52 [doi]
- ARECA: a highly attack resilient certification authorityJiwu Jing, Peng Liu 0005, Dengguo Feng, Ji Xiang, Neng Gao, Jingqiang Lin. 53-63 [doi]
- Attack resistant cache replacement for survivable servicesVinay Manivel, Mustaque Ahamad, H. Venkateswaran. 64-71 [doi]
- A biological programming model for self-healingSelvin George, David Evans 0001, Steven Marchette. 72-81 [doi]
- Sliding-window self-healing key distributionSara Miner More, Michael Malkin, Jessica Staddon, Dirk Balfanz. 82-90 [doi]
- Modeling insecurity: policy engineering for survivabilityPrasad Naldurg, Roy H. Campbell. 91-98 [doi]
- Continual repair for windows using the event logJames C. Reynolds, Larry A. Clough. 99-104 [doi]
- TRIAD: a framework for survivability architectingAndrew P. Moore, Robert J. Ellison. 105-109 [doi]
- An intrusion tolerant architecture for dynamic content internet serversAyda Saïdane, Yves Deswarte, Vincent Nicomette. 110-114 [doi]
- Self-regenerative software componentsHassen Saïdi, Bruno Dutertre, Joshua Levy, Alfonso Valdes. 115-120 [doi]