A logical design of a session service control layer of a distributed network architecture for SPLICE.

Download
Author
Frew, Barry A.
Date
1984-06Advisor
Schneidewind, Norman F.
Metadata
Show full item recordAbstract
This thesis provides a logical design view of the
session services control layer of a distributed network to
be used in the SPLICE (Stock Point Logistics Integrated
Communication Environment) project. It examines the
functional requirements of session services, the data
necessary to provide that functionality, and the interfaces
required. These areas typically focus on the SPLICE
application specifically, but apply to a generic session
services as well.
The recommendations that are offered relate
specifically to the SPLICE application and address the
prospect of placing a fault tolerant capability in session
services for SPLICE. Other recommendations are appropriate
only to the SPLICE environment.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Planning Cost-Effective Deceptive Resource Denial in Defense to Cyber-Attacks
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2007-03);Cyber-attacks against computer systems that provide valuable services can often be effectively defended by tactics of deliberately deceptive resource denial. Delaying in response to suspicious requests is one example; it ... -
CGC monitor: A vetting system for the DARPA cyber grand challenge
Thompson, Michael F.; Vidas, Timothy (Elsevier, 2018);The DARPA Cyber Grand Challenge (CGC) pit autonomous machines against one another in a battle to discover, mitigate, and take advantage of software vulnerabilities. The competitors repeatedly formulated and submitted binary ... -
Analysis of mechanisms for TCBE control of object reuse in clients
Agacayak, Cihan. (Monterey, California. Naval Postgraduate School, 2000-03);This study contributes to the realization of a high assurance Multilevel Secure Local Area Network. The system consists of a Trusted Computing Base (TCB) that acts as a server base. Clients are COTS workstations and software, ...