Outline
Network centric warfare environments.
Peer Byzantine replication limitations.
Research approach.
- Scaling wide area intrusion tolerance replication via hierarchy
- Local Byzantine replication within sites.
- Fault tolerant replication on the wide area.
- Client accountability.
- Accountability graph.
- Snapshots for fast regenerations.
- Exploiting application semantics.
Technology transitioning.