There is a significant body of research on distributed computing architectures, methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they have taken separate paths until recently, the problems to be solved are of similar nature. In classical dependability, fault tolerance has been the workhorse of many solutions. Classical security-related work has on the other hand privileged, with few exceptions, intrusion prevention. Intrusion tolerance (IT) is a new approach that has slowly emerged during the past decade, and gained impressive momentum recently. Instead of trying to prevent every single intrusion, these are allowed, but tolerated: the system triggers mechanisms that prevent the intrusion from generati...
In this paper, we present the architecture of CoBFIT, a component-based framework for building intru...
The First Workshop on Recent Advances on Intrusion-Tolerant Systems aimed to bring together research...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
There is a significant body of research on distributed computing architectures, methodologies and al...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
In traditional dependability, fault tolerance has been the workhorse of the many solutions published...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
The pervasive interconnection of systems all over the world has given computer services a significan...
Applications that are part of a mission-critical information system need to maintain a usable level ...
Intrusion detection research has so far concentrated on techniques that e®ectively identify the mali...
Abstract. Recently cyber security has emerged as an established discipline for computer systems and ...
In this paper, we present the architecture of CoBFIT, a component-based framework for building intru...
The First Workshop on Recent Advances on Intrusion-Tolerant Systems aimed to bring together research...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...
There is a significant body of research on distributed computing architectures, methodologies and al...
Security in distributed computing systems is usually based on the idea of prevention. The usual appr...
Security intrusions and successful attacks on computer systems will occur regardless of the quality ...
In traditional dependability, fault tolerance has been the workhorse of the many solutions published...
Information such as security advisories, emergency recommendations, e-government information, etc., ...
The pervasive interconnection of systems throughout the world has given computer services a signific...
Intrusion detection research has been so far mostly concentrated on techniques that effectively iden...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
The pervasive interconnection of systems all over the world has given computer services a significan...
Applications that are part of a mission-critical information system need to maintain a usable level ...
Intrusion detection research has so far concentrated on techniques that e®ectively identify the mali...
Abstract. Recently cyber security has emerged as an established discipline for computer systems and ...
In this paper, we present the architecture of CoBFIT, a component-based framework for building intru...
The First Workshop on Recent Advances on Intrusion-Tolerant Systems aimed to bring together research...
Abstract: Malicious attackers can cause severe damage (financially or to the envi-ronment) if they g...