References
[1]. Gruschka, N., and Luttenberger, N. (2006). "Protecting
Web Services From DoS Attacks by SOAP Message Validation", IFIP International Federation for Information
Processing, Springer Boston, Vol. 201, 171-182.
[2]. J.E. Just, J.C. Reynolds, and K. Levitt, (2002). “Intrusion
tolerance through forensics-based attack learning,” in
Intrusion Tolerant System Workshop, Supplemental
Volume on 2002 International Conference on
Dependable System and Networks, pp. C–4–1.
[3]. Organically assured and survivable information
system (OASIS). http://www.tolerantsystems.org.
[4]. H. Kopetz and P. Ver´issimo, (1993). Real Time and
Dependability Concepts, ch. 16, pp. 411–446. Addison-
Wesley.
[5]. Reynolds, J. et al. (2001). "The Design and
Implementation of an Intrusion Tolerant System”,
Proceedings of the 2002 International Conference on
Dependable Systems and Networks (2001) 285-290.
[6]. Stavridou, V. et al. (2002). "Intrusion Tolerant Software
Architectures", DARPA Information Sur vivability
Conference and Exposition (DISCEX II'01), Vol. II, pp.230-
241.
[7]. Veríssimo, P., Neves, N., and Pupo Correia, M. (2003).
"Intrusion-Tolerant Architectures: Concepts and Design",
Lecture Notes in Computer Science, Vol. 2677, pp.3-36.
[8]. D. O'Brien, R. Smith, T. Kappel, and C. Bitzer, (2003).
“Intrusion tolerant via network layer controls,” in
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX'03), pp. 90-96.
[9]. http://en.wikipedia.org/wiki/HMAC.
[10]. http://csrc.nist.gov/publications/fips/fips198/fips-
198a.pdf.
[11]. M. Nagaratna, Dr. V. Kamakshi Prasad, S. Tanuz
Kumar (n.d). ”Detecting and Preventing IP-spoofed DDoS
Attacks by Encrypted Marking based Detection and
Filtering (EMDAF)”, Dept. of CSE, Jawaharlal Nehru
Technological University.
[12]. K. Kar, S. Sarkar, and L. Tassiulas, (2001).
“Optimization based rate control for multirate multicast
sessions,” in Proc. IEEE INFOCOM, pp.123-132.
[13]. S. Deb, and R. Srikant, (2001). “Congestion control
for fair resource allocation in networks with multicast
flows,” in Proc. IEEE Conf. Decision and Control, Dec.,
pp.1911-1916.
[14]. D. Kesavaraja, R. Balasubramanian and D. Sasireka
(n.d). Implementation of a Cloud Data Server (CDS) for
Providing Secure Service in E-Business, International
Journal of Database Management Systems ( IJDMS ),
(ISSN: 0975-5705).
[15]. E. Graves, R. Srikant, and D. Towsley, (2001).
“Decentralized computation of weighted max-min fair
bandwidth allocation in networks with multicast flows,” in
Proc. Tyrrhenian Int. Workshop Digital Communications
(IWDC'01), Taormina, Italy, Sept., pp.326-342.