The pervasive interconnection of systems all over the world has given computer services a significant socio-economic value, which can be affected both by accidental faults and by malicious activity. It would be appealing to address both problems in a seamless manner, through a common approach to security and dependability. This is the proposal of intrusion tolerance, where it is assumed that systems remain to some extent faulty and/or vulnerable and subject to attacks that can be successful, the idea being to ensure that the overall system nevertheless remains secure and operational. In this paper, we report some of the advances made in the European project MAFTIA, namely in what concerns a basis of concepts unifying security and dependabil...
Increasingly, more aspects of our lives rely on the correctness and safety of computing systems, nam...
In this paper, we present the blueprint of a novel middleware infrastructure that can be used to bui...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
The pervasive interconnection of systems all over the world has given computer services a significan...
In this paper, we present the middleware architecture of MAFTIA, an ESPRIT project aiming at develop...
There is a significant body of research on distributed computing architectures, methodologies and al...
In traditional dependability, fault tolerance has been the workhorse of the many solutions published...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
This document constitutes the first deliverable of MAFTIA work package 1. The objective of this work...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
While there is considerable experience with addressing the needs for security and fault-tolerance i...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Increasingly, more aspects of our lives rely on the correctness and safety of computing systems, nam...
In this paper, we present the blueprint of a novel middleware infrastructure that can be used to bui...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
The pervasive interconnection of systems all over the world has given computer services a significan...
In this paper, we present the middleware architecture of MAFTIA, an ESPRIT project aiming at develop...
There is a significant body of research on distributed computing architectures, methodologies and al...
In traditional dependability, fault tolerance has been the workhorse of the many solutions published...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
This document constitutes the first deliverable of MAFTIA work package 1. The objective of this work...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
While there is considerable experience with addressing the needs for security and fault-tolerance i...
National audienceThis paper presents a work-in-progress of our approach for intrusion survivability ...
Increasingly, more aspects of our lives rely on the correctness and safety of computing systems, nam...
In this paper, we present the blueprint of a novel middleware infrastructure that can be used to bui...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...