There is a significant body of research on distributed computing architectures, methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they have taken separate paths until recently, the problems to be solved are of similar nature. In classical dependability, fault tolerance has been the workhorse of many solutions. Classical security-related work has on the other hand privileged, with few exceptions, intrusion prevention. Intrusion tolerance (IT) is a new approach that has slowly emerged during the past decade, and gained impressive momentum recently. Instead of trying to prevent every single intrusion, these are allowed, but tolerated: the system triggers mechanisms that prevent the intrusion from generati...
The paper starts by introducing a new dimension along which distributed systems resilience may be ev...
Intrusion detection research has so far concentrated on techniques that e®ectively identify the mali...
Applications that are part of a mission-critical information system need to maintain a usable level ...
There is a significant body of research on distributed computing architectures, methodologies and al...
In traditional dependability, fault tolerance has been the workhorse of the many solutions published...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
The pervasive interconnection of systems all over the world has given computer services a significan...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
PhD ThesisThe internet is increasingly used as a means of communication by many businesses. Online ...
The application of the tolerance paradigm to security intrusion tolerance has been raising a good de...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
The paper starts by introducing a new dimension along which distributed systems resilience may be ev...
Intrusion detection research has so far concentrated on techniques that e®ectively identify the mali...
Applications that are part of a mission-critical information system need to maintain a usable level ...
There is a significant body of research on distributed computing architectures, methodologies and al...
In traditional dependability, fault tolerance has been the workhorse of the many solutions published...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
The pervasive interconnection of systems all over the world has given computer services a significan...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
PhD ThesisThe internet is increasingly used as a means of communication by many businesses. Online ...
The application of the tolerance paradigm to security intrusion tolerance has been raising a good de...
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and s...
The paper starts by introducing a new dimension along which distributed systems resilience may be ev...
Intrusion detection research has so far concentrated on techniques that e®ectively identify the mali...
Applications that are part of a mission-critical information system need to maintain a usable level ...