References
- Sun Microsystems, "JiniTM Architecture Specification", Published Specification, http://java.sun.com/products/jini/2.0/doc/specs/html/jini-spec.html, 2003
- D. Szentivanyi and S. Nadjm-Tehrani, "Middle- ware Support for Fault Tolerance", Chapter 28 in Middleware for Communications, Q. Mahmoud (Ed.), John Wiley & Sons, 2004
- Marc Schonefeld. "Hunting Flaws in JDK", In Blackhat Europe 2003. May 2003
- Hein Meling, et al., "Jgroup/ARM: a distributed object group platform with autonomous replication managements", Software Practice and Experience, John Wiley & Sons, 2007
- R.J.Ellison et.al., ""Survivable Network Systems : An Emerging Discipline", Technical Report CMU/SEI-97-TR013, 1999
- Johannes Osrael, et al.,"Using Replication to Build Highly Available .Net Applications", Proceedings of the 17th International Conference on Database and Expert Systems Applications, pp. 385-398, 2006
- Heine Kolltveit et al., "Preventing Orphan Requests by Integrating Replication and Transactions", LNCS 4690, Springer-Verlag Berlin, 2007
- Hein Meling, et al., "Performance Consequences of Inconsistent Client-side Membership Information in the Open Group Model", Proceedings of the 23rd IEEE International Performance, Computing and Communications Conference. pp.777-782, 2004
- M. Tichy, H. Giese. "An Architecture for Configurable Dependability of Application Services", Proc. of the ICSE 2003 Workshop on Software Architectures for Dependable Systems. pp. 65-70, Portland, OR. April 2003
- Peer Hasselmeyer, et al., "Trade-offs in a Secure Jini Service Architecture", LNCS 1890, Springer-Verlag Berlin, 2000
- Pasi Eronen and Pekka Nikander. "Decentralized Jini security", In Proceedings of the Network and Distributed System Security Symposium (NDSS 2001), pages 161-172, San Diego, California, February 2001
- Thomas Schoch, et al. "Making Jini Secure", Proc. 4th International Conference on Electronic Commerce Research, pages 276-286, Nov. 2001
- Frank Sommers, "Jini Starter Kit 2.0 tightens Jini's security framework," Los Alamitos, CA., IEEE Computer Society Press, 2003
- Sun Microsystems, "Java Secure Socket Extension(JSSE) Reference Guide for Java Platform Standard Edition 6", http://java.sun.com/javase/6/docs/tech-notes/guides/security/jsse/JSSERefGuide.html#Fe-atures
- Reynolds, J. et al, "The Design and Implementation of an Intrusion Tolerant System", Proc. of Int'l Conference on Dependable Systems and Networks, 2002
- Wang F., et al, "SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services", DARPA Information Survivability Conference & EXposition, 2001
- Byoung Jun Min, et al. "Committing Secure Results with Replicated Servers", LNCS 3043, Springer-Verlag Berlin, 2004
- Marshall Pease, Robert Shostak, Leslie Lamport, "Reaching Agreement in the Presence of Faults", Journal of the ACM 27/2 228-234 1980 https://doi.org/10.1145/322186.322188
- Amir. Y. et al. "Secure Group Communication Using Robust Contributory Key Agreement", IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 15, no. 5, pp. 468-480, May 2004 https://doi.org/10.1109/TPDS.2004.1278104
- Sun Microsystems, "Jini Technology Starter Kit Overview v2.0," Published Specification, http://java.sun.com/developer/products/jini/arch2_0.html, 2003