HariGovind V. Ramasamy

Former group member (MS, 2002; Ph.D., 2005).
LinkedIn profile

Publications with the Performability Engineering Research Group

Intrusion Tolerance Approaches in ITUA.
M. Cukier, J. Lyons, P. Pandey, H. V. Ramasamy, W. H. Sanders, P. Pal, F. Webber, R. Schantz, J. Loyall, R. Watro, M. Atighetchi, and J. Gossett. (01CUK01)
FastAbstract in Supplement of the 2001 International Conference on Dependable Systems and Networks, Göteborg, Sweden, July 1-4, 2001, pp. B-64 to B-65.

A Group Membership Protocol for an Intrusion-Tolerant Group Communication System.
H. V. Ramasamy. (02RAM01)
Master’s Thesis, University of Illinois at Urbana-Champaign, 2002.

Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems.
H. V. Ramasamy, P. Pandey, J. Lyons, M. Cukier, and W. H. Sanders. (01RAM01)
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN-2002), Washington, DC, June 23-26, 2002, pp. 229-238. [IEEE Xplore entry]

A Configurable CORBA Gateway for Providing Adaptable System Properties.
M. Seri, T. Courtney, M. Cukier, V. Gupta, S. Krishnamurthy, J. Lyons, H. Ramasamy, J. Ren, and W. H. Sanders. (02SER01)
Supplemental Volume of the 2002 International Conference on Dependable Systems & Networks (DSN-2002), Washington, DC, June 23-26, 2002, pp. G-26 to G-30.

Providing Intrusion Tolerance with ITUA.
T. Courtney, J. Lyons, H. V. Ramasamy, W. H. Sanders, M. Seri, M. Atighetchi, P. Rubel, C. Jones, F. Webber, P. Pal, R. Watro, M. Cukier, and J. Gossett. (02COU01)
Supplemental Volume of the 2002 International Conference on Dependable Systems & Networks (DSN-2002), Washington, DC, June 23-26, 2002, pp. C-5-1 to C-5-3.

Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System.
H. V. Ramasamy, M. Cukier, and W. H. Sanders. (02RAM02)
Proceedings of the 2002 Pacific Rim International Symposium on Dependable Computing (PRDC 2002), Tsukuba, Japan, December 16-18, 2002, pp. 9-18. [IEEE Xplore entry]

Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures.
V. Gupta, V. Lam, H. V. Ramasamy, W. H. Sanders, and S. Singh. (03GUP01)
Dependable Computing: Proceedings of the First Latin-American Symposium (LADC 2003), São Paulo, Brazil, October 21-24, 2003, Lecture Notes in Computer Science vol. 2847 (Rogério de Lemos, Taisy Silva Weber, and João Batista Camargo Jr., eds), Berlin: Springer, 2003, pp. 81-101.

Stochastic Modeling of Intrusion-Tolerant Server Architectures for Dependability and Performance Evaluation.
V. Gupta, V. Lam, H. V. Ramasamy, W. H. Sanders, and S. Singh. (03GUP03)
University of Illinois at Urbana-Champaign Coordinated Science Laboratory technical report UILU-ENG-03-2227 (CRHC-03-13), December 2003.

Formal Verification of an Intrusion-Tolerant Group Membership Protocol.
H. V. Ramasamy, M. Cukier, and W. H. Sanders. (03RAM01)
IEICE Transactions on Information and Systems special issue on Dependable Computing, vol. E86-D, no. 12, December 2003, pp. 2612-2622.

Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System.
H. V. Ramasamy, M. Cukier, and W. H. Sanders. (03RAM05) [IEEE Xplore entry]
in Foundations of Intrusion Tolerant Systems (Jay Lala, ed.), pp. 251-260. Los Alamitos, CA: IEEE Computer Society, 2003. (Reprint of the conference paper with the same name.)

Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems.
H. V. Ramasamy, P. Pandey, J. Lyons, M. Cukier, and W. H. Sanders. (03RAM06) [IEEE Xplore entry]
in Foundations of Intrusion Tolerant Systems (Jay Lala, ed.), pp. 241-250. Los Alamitos, CA: IEEE Computer Society, 2003. (Reprint of the conference paper with the same name.)

Semi-Passive Replication in the Presence of Byzantine Faults.
H. V. Ramasamy, A. Agbaria, and W. H. Sanders. (04RAM01)
University of Illinois at Urbana-Champaign Coordinated Science Laboratory technical report no. UILU-ENG-04-2202 (CRHC-04-02), February 2004.

Group Communication Protocols and a Framework for Intrusion-Tolerant Distributed Applications.
H. V. Ramasamy. (04RAM02)
Supplemental Volume of the IFIP World Computer Congress, Toulouse, France, August 22-27, 2004.

CoBFIT: A Component-Based Framework for Intrusion Tolerance.
H. V. Ramasamy, A. Agbaria, and W. H. Sanders. (04RAM03)
Proceedings of the 30th Euromicro Conference, Rennes, France, August 31-September 3, 2004, pp. 591-600. [IEEE Xplore entry]

Parsimony-Based Approach for Obtaining Resource-Efficient and Trustworthy Execution.
H. V. Ramasamy, A. Agbaria, and W. H. Sanders. (05RAM01)
Dependable Computing: Proceedings of the 2nd Latin-American Symposium (LADC 2005), Salvador, Brazil, October 25-28, 2005, LNCS vol. 3747, Springer-Verlag, pp. 206-225.

Parsimonious Asychronous Byzantine-Fault-Tolerant Atomic Broadcast.
H. V. Ramasamy and C. Cachin. (05RAM03)
Proceedings of the 9th International Conference on Principles of Distributed Systems (OPODIS), Pisa, Italy, Dec. 12-14, 2005.

Parsimonious Service Replication for Tolerating Malicious Attacks in Asynchronous Environments.
H. V. Ramasamy. (05RAM05)
Ph.D. thesis, University of Illinois at Urbana-Champaign, 2005.

The Parsimonious Approach to Constructing Fault-Tolerant Protocols.
H. V. Ramasamy, C. Cachin, A. Agbaria, and W. H. Sanders. (06RAM01)
Fast Abstract at the International Conference on Dependable Systems and Networks (DSN-2006), Philadelphia, PA, USA, June 25-28, 2006.

An Architecture for Adaptive Intrusion-Tolerant Applications.
P. Pal, P. Rubel, M. Atighetchi, F. Webber, W. H. Sanders, M. Seri, H. Ramasamy, J. Lyons, T. Courtney, A. Agbaria, M. Cukier, J. Gossett, and I. Keidar. (04PAL01)
Special issue of Software: Practice and Experience on Experiences with Auto-adaptive and Reconfigurable Systems, vol. 36, no. 11-12, September-October 2006, pp. 1331-1354.

A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution.
H. V. Ramasamy, A. Agbaria, and W. H. Sanders. (05RAM04)
IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 1, January-March 2007, pp. 1-17. [IEEE Xplore entry]

The CoBFIT Toolkit.
H. Ramasamy, M. Seri, and W. H. Sanders. (07RAM01)
Proceedings of the 26th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2007), Portland, Oregon, Aug. 12-15, 2007, pp. 350-351. [ACM DOI: http://dx.doi.org/10.1145/1281100.1281167]

Experiences with Building an Intrusion-Tolerant Group Communication System.
H. V. Ramasamy, P. Pandey, M. Cukier, and W. H. Sanders. (06RAM02)
Software-Practice and Experience, vol. 38, no. 6, May 2008, pp. 639-666.

Managing Business Health in the Presence of Malicious Attacks.
S. A. Zonouz, A. Sharma, H. V. Ramasamy, Z. T. Kalbarczyk, B. Pfitzmann, K. McAuliffe, R. K. Iyer, W. H. Sanders, and E. Cope. (11ZON04)
Proceedings of the IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), Hong Kong, China, June 27-30, 2011, pp. 9-14. [IEEE Xplore entry]

Combining Learning and Model-Based Reasoning to Reduce Uncertainties in Cloud Security and Compliance Auditing.
U. Thakore, R. Ranchal, Y.-H. Wei and H. V. Ramasamy. (19THA01)
Proceedings of the 38th IEEE Symposium on Reliable Distributed Systems (SRDS 2019), Lyon, France, Oct. 1-4, 2019, pp. 269-274. [IEEE Xplore entry]

Coordinated Analysis of Heterogeneous Monitor Data in Enterprise Clouds for Incident Response.
U. Thakore, H. V. Ramasamy, and W. H. Sanders. (19THA02)
Proceedings of the 30th International Symposium on Software Reliability Engineering Workshops (ISSREW), Berlin, Germany, October 28-31, 2019, pp. 53-58. [IEEE Xplore entry]


COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”

With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.