In a recent paper, we presented proactive resilience as a new approach to proactive recovery, based on architectural hybridization. We showed that, with appropriate assumptions about fault rate, proactive resilience makes it possible to build distributed intrusion-tolerant systems guaranteed not to suffer more than the assumed number of faults during their lifetime. In this paper, we explore the impact of these assumptions in asynchronous systems, and derive conditions that should be met by practical systems in order to guarantee long-lived, i.e., available, intrusion-tolerant operation. Our conclusions are based on analytical and simulation results as implemented in Möbius, and we use the same modeling environment to show that our approach...
The functionality and the performance of smart environment applications can be hampered by faults. F...
International audienceSystems are expected to evolve during their service life in order to cope with...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
This thesis introduces a new dimension over which systems dependability may be evaluated, exhaustion...
Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated sys...
Recently, we presented a theoretical Physical System Model (PSM), which introduced a new dimension o...
The paper starts by introducing a new dimension along which distributed systems resilience may be ev...
Abstract. Recent papers propose asynchronous protocols that can tol-erate any number of faults over ...
Fault-tolerant protocols, asynchronous and synchronous alike, make stationary fault assumptions: onl...
Tese de doutoramento em Informática (Ciências da Computação), apresentada à Universidade de Lisboa a...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Intrusion tolerance is a recent approach to deal with intentional and mali-cious failures. It combin...
Proactive security provides a method for maintaining the overall security of a system, even when ind...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
The functionality and the performance of smart environment applications can be hampered by faults. F...
International audienceSystems are expected to evolve during their service life in order to cope with...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
This thesis introduces a new dimension over which systems dependability may be evaluated, exhaustion...
Previous works have studied how to use proactive recovery to build intrusion-tolerant replicated sys...
Recently, we presented a theoretical Physical System Model (PSM), which introduced a new dimension o...
The paper starts by introducing a new dimension along which distributed systems resilience may be ev...
Abstract. Recent papers propose asynchronous protocols that can tol-erate any number of faults over ...
Fault-tolerant protocols, asynchronous and synchronous alike, make stationary fault assumptions: onl...
Tese de doutoramento em Informática (Ciências da Computação), apresentada à Universidade de Lisboa a...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
Abstract This paper considers the estimation of re-liability and availability of intrusion-tolerant ...
Intrusion tolerance is a recent approach to deal with intentional and mali-cious failures. It combin...
Proactive security provides a method for maintaining the overall security of a system, even when ind...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...
The functionality and the performance of smart environment applications can be hampered by faults. F...
International audienceSystems are expected to evolve during their service life in order to cope with...
International audienceDespite the deployment of preventive security mechanisms to protect the assets...