Identity delegation in policy based systems
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
An approximation technique is presented to evaluate the dependability of FDDI networks. This technique, based on the most likely paths to failure concept, is simple and practical. It may be applied easily to evaluate and compare the dependability of different FDDI network configurations. The effects of various network parameters on the network availability are examined. We conclude that, in order to guarantee high availability, an FDDI network backbone should be interconnected using dual-attachment concentrators. Furthermore, dual-homing configurations are required for high-availability paths between end stations and the backbone. For less stringent availability requirements, single-attachment concentrator trees with single-attachment stations may suffice. We also discuss how the technique may be extended easily to more general heterogeneous networks including Token Ring and Ethernet. © 1997 IEEE.
Rajeev Gupta, Shourya Roy, et al.
ICAC 2006
Robert E. Donovan
INTERSPEECH - Eurospeech 2001
Khalid Abdulla, Andrew Wirth, et al.
ICIAfS 2014
M.J. Slattery, Joan L. Mitchell
IBM J. Res. Dev