ACKNOWLEDGEMENTS
We thank Dr. Yan Yang for the discussions of some
contents of the paper. We also thank all anonymous
reviews comments which helped us to greatly im-
prove the quality of the paper. Meng Yu was sup-
ported by NSF grant CNS-0905153. Peng Liu was
supported by NSF CNS-0905131, AFOSR FA9550-
07-1-0527 (MURI), and ARO MURI: Computer-
aided Human Centric Cyber Situation Awareness.
REFERENCES
Alvisi, L., Malkhi, D., Pierce, E., and Reiter, M. K. (2001).
Fault detection for byzantine quorum systems. IEEE
Transactions on Parallel and Distributed Systems,
12(9):996–1007.
Bernstein, P. A., Hadzilacos, V., and Goodman, N. (1987).
Concurrency Control and Recovery in Database Sys-
tems. Addison-Wesley, Reading, MA.
Castro, M. (2001). Practical Byzantine Fault Tolerance.
PhD thesis, Department of Electrical Engineering and
Computer Science, Massachusetts Institute of Tech-
nology. Also as Technical Report MIT/LCS/TR-817.
Castro, M. and Liskov, B. (1999). Practical byzantine fault
tolerance. In The Third Symposium on Operating Sys-
tems Design and Implementation (OSDI ’99), pages
173–186, New Orleans, USA.
Chun, B.-G., Maniatis, P., and Shenker, S. (2008). Diverse
replication for single-machine byzantine-fault toler-
ance. In ATC’08: USENIX 2008 Annual Technical
Conference on Annual Technical Conference, pages
287–292, Berkeley, CA, USA. USENIX Association.
Gokhale, S. S., Vandal, P. J., and Lu, J. (2006). Perfor-
mance and reliability analysis ofweb server software
architectures. In PRDC ’06: Proceedings of the 12th
Pacific Rim International Symposium on Dependable
Computing, pages 351–358, Washington, DC, USA.
IEEE Computer Society.
Jajodia, S. and Mutchler, D. (1990). Dynamic voting algo-
rithms for maintaining the consistency of a replicated
database. ACM Trans. Database Syst., 15(2):230–280.
Kotla, R., Alvisi, L., Dahlin, M., Clement, A., and Wong,
E. (2007). Zyzzyva: speculative byzantine fault toler-
ance. SIGOPS Oper. Syst. Rev., 41(6):45–58.
Malkhi, D. and Reiter, M. (1998). Byzantine quorum sys-
tem. Distributed Computing, 11(4):203–213.
Marsan, M. A. (1990). Stochastic Petri nets: an elementary
introduction, pages 1–29. Springer-Verlag New York,
Inc., New York, NY, USA.
Mauw, S. and Oostdijk, M. (2005). Foundations of at-
tack trees. In International Conference on Information
Security and Cryptology ICISC 2005. LNCS 3935,
pages 186–198. Springer.
Nicol, D. M., Sanders, W. H., and Trivedi, K. S. (2004).
Model-based evaluation: From dependability to secu-
rity. IEEE Transactions on Dependable and Secure
Computing, 1(1):48–65.
Padilla, G., Gao, T., Yen, I.-L., Bastani, F., and de Oca,
C. M. (2008). An early reliability assessment model
for data-flow software architectures. Mexican Inter-
national Conference on Computer Science, 0:9–19.
Sahner, R. A., Trivedi, K. S., and Puliafito, A. (1996a). Per-
formance and Reliability Analysis of Computer Sys-
tems. Kluwer Academic Publishers, Norwell, Mas-
sachusetts, USA.
Sahner, R. A., Trivedi, K. S., and Puliafito, A. (1996b).
Performance and reliability analysis of computer sys-
tems: an example-based approach using the SHARPE
software package. Kluwer Academic Publishers, Nor-
well, MA, USA.
Sanders, W. H., S, W. H., and Meyer, J. F. (2001). Stochastic
activity networks: Formal definitions and concepts.
Sawilla, R. E. and Ou, X. (2008). Identifying critical at-
tack assets in dependency attack graphs. In ESORICS
’08: Proceedings of the 13th European Symposium on
Research in Computer Security, pages 18–34, Berlin,
Heidelberg. Springer-Verlag.
Schneider, F. B. (1990). Implementing fault tolerant ser-
vices using the state machine approach: A tutorial.
ACM Computing Surveys, 22(4).
Seguin, J., Sergeant, G., and Wilms, P. (1979). A major-
ity consensus algorithm for the consistency of dupli-
cated and distributed information. In IEEE Interna-
tional Conference on Distributed Computing Systems,
pages 617–624, New York.
Tijms, H. C. (1994). Stochastic Models. Wiley series in
probability and mathematical statistics. John Wiley &
Son, New York, NY, USA.
EVALUATING SURVIVABILITY AND COSTS OF THREE VIRTUAL MACHINE BASED SERVER
ARCHITECTURES
485