A novel approach of structuring mission-critical systems with an emphasis on intrusion tolerance is described. Key components in the proposed system include traffic regulation, application request processing, state protection, integrity checking, and process/node health monitoring. In particular, the separation of execution and state management enables the use of a single process to manage application requests, thereby reducing run-time overhead and enables highly concurrent executions. Furthermore, intrusion attacks are mitigated by two means: (1) append-only state logging so that a compromised execution node cannot corrupt state updates from other nodes; and (2) acceptance testing as a way to verify the integrity of the execution of appli...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
An intrusion tolerant architecture to enhance the security of smart grid control centers. The propos...
A novel approach of structuring mission-critical systems with an emphasis on intrusion tolerance is ...
In this paper, we present the blueprint of a novel middleware infrastructure that can be used to bui...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
There is a significant body of research on distributed computing architectures, methodologies and al...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Intrusion detection research has so far concentrated on techniques that e®ectively identify the mali...
The protection of application servers using intrusion detection andother related techniques is studi...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
Host-based intrusion-prevention systems are currently popular technologies which try to prevent expl...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
An intrusion tolerant architecture to enhance the security of smart grid control centers. The propos...
A novel approach of structuring mission-critical systems with an emphasis on intrusion tolerance is ...
In this paper, we present the blueprint of a novel middleware infrastructure that can be used to bui...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
There is a significant body of research on distributed computing architectures, methodologies and al...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Intrusion detection research has so far concentrated on techniques that e®ectively identify the mali...
The protection of application servers using intrusion detection andother related techniques is studi...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Protecting networks from computer security attacks is an important concern of computer security. Wit...
Host-based intrusion-prevention systems are currently popular technologies which try to prevent expl...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
An intrusion tolerant architecture to enhance the security of smart grid control centers. The propos...