-
1
-
-
4544309379
-
MAFTIA (malicious- and accidental-fault tolerance for internet applications)
-
Göteborg, Sweden
-
D. Powell, A. Adelsbach, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, T. McCutcheon, N. Neves, B. Pfitzmann, B. Randell, R. Stroud, P. Verissimo, and M. Waidner, "MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications)", in Supplement of the 2001 Int. Conf. on Dependable Systems and Networks (DSN'2001), (Göteborg, Sweden), pp.D32-D35, 2001.
-
(2001)
Supplement of the 2001 Int. Conf. on Dependable Systems and Networks (DSN'2001)
-
-
Powell, D.1
Adelsbach, A.2
Cachin, C.3
Creese, S.4
Dacier, M.5
Deswarte, Y.6
McCutcheon, T.7
Neves, N.8
Pfitzmann, B.9
Randell, B.10
Stroud, R.11
Verissimo, P.12
Waidner, M.13
-
3
-
-
0004141256
-
-
Research Report no. 01145 (Revision 1: December 2002), LAAS-CNRS, August (UCLA CSD Report no. 010028; Newcastle University Report no. CS-TR-739)
-
A. Avizienis, J.-C. Laprie, and B. Randell, Fundamental Concepts of Dependability, Research Report no. 01145 (Revision 1: December 2002), LAAS-CNRS, August 2001 (UCLA CSD Report no. 010028; Newcastle University Report no. CS-TR-739).
-
(2001)
Fundamental Concepts of Dependability
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
-
6
-
-
73649094066
-
A simple intrusion-tolerant reliable multicast protocol using the TTCB
-
Natal, Brasil
-
L. Cheuk Lung, M. Correia, N. Neves, and P. Verissimo, "A Simple Intrusion-Tolerant Reliable Multicast Protocol using the TTCB", in Simpósio Brasileiro de Redes de Computadores, (Natal, Brasil), 2003.
-
(2003)
Simpósio Brasileiro de Redes de Computadores
-
-
Lung, L.C.1
Correia, M.2
Neves, N.3
Verissimo, P.4
-
7
-
-
0034500567
-
Random oracles in constantinople: Practical asynchronous Byzantine agreement using cryptography
-
C. Cachin, K. Kursawe, and V. Shoup, "Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography", in Proc. 19th ACM Symposium on Principles of Distributed Computing (PODC), pp.123-132, 2000.
-
(2000)
Proc. 19th ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 123-132
-
-
Cachin, C.1
Kursawe, K.2
Shoup, V.3
-
8
-
-
4544292300
-
An intrusion-tolerant authorization scheme for internet applications
-
(Washington, D.C. (USA)), IEEE CS Press
-
Y. Deswarte, N. Abghour, V. Nicomette, and D. Powell, "An Intrusion-Tolerant Authorization Scheme for Internet Applications", in Supplement of the 2002 International Conference on Dependable Systems and Networks (DSN'2002), (Washington, D.C. (USA)), pp.C.1.1-C.1.6, IEEE CS Press, 2002.
-
(2002)
Supplement of the 2002 International Conference on Dependable Systems and Networks (DSN'2002)
-
-
Deswarte, Y.1
Abghour, N.2
Nicomette, V.3
Powell, D.4
-
9
-
-
4544282968
-
-
Deliverable Dl, MAFTIA Project
-
MAFTIA, Reference Model and Use Cases, Deliverable Dl, MAFTIA Project, 2000.
-
(2000)
Reference Model and Use Cases
-
-
-
11
-
-
70449355813
-
-
MAFTIA Project, Deliverable D99, January
-
I. S. Welch, J. P. Warne, P. Y. A. Ryan, and R. J. Stroud, Architectural Analysis of MAFTIA's Intrusion Tolerance Capabilities, MAFTIA Project, Deliverable D99, January 2003.
-
(2003)
Architectural Analysis of MAFTIA's Intrusion Tolerance Capabilities
-
-
Welch, I.S.1
Warne, J.P.2
Ryan, P.Y.A.3
Stroud, R.J.4
-
12
-
-
4544226402
-
-
MAFTIA Project, Deliverable D6, April
-
N. Abghour, Y. Deswarte, V. Nicomette, and D. Powell, Design of the Local Reference Monitor, MAFTIA Project, Deliverable D6, April 2002.
-
(2002)
Design of the Local Reference Monitor
-
-
Abghour, N.1
Deswarte, Y.2
Nicomette, V.3
Powell, D.4
-
15
-
-
33748697823
-
Intrusion-tolerant architectures: Concepts and design
-
(R. Lemos, C. Gacek, and A. Romanovsky, Eds.), 2677, Lecture Notes in Computer Science, Springer-Verlag
-
P. J. Verissimo, N. F. Neves, and M. Correia, "Intrusion-Tolerant Architectures: Concepts and Design", in Architecting Dependable Systems, (R. Lemos, C. Gacek, and A. Romanovsky, Eds.), 2677, Lecture Notes in Computer Science, Springer-Verlag, 2003.
-
(2003)
Architecting Dependable Systems
-
-
Verissimo, P.J.1
Neves, N.F.2
Correia, M.3
-
16
-
-
0024132223
-
The delta-4 approach to dependability in open distributed computing systems
-
(Tokyo, Japan), IEEE CS Press
-
D. Powell, G. Bonn, D. Seaton, P. Verissimo, and F. Waeselynck, "The Delta-4 Approach to Dependability in Open Distributed Computing Systems", in 18th IEEE Int. Symp. on Fault-Tolerant Computing Systems (FTCS-18), (Tokyo, Japan), pp.246-251, IEEE CS Press, 1988.
-
(1988)
18th IEEE Int. Symp. on Fault-tolerant Computing Systems (FTCS-18)
, pp. 246-251
-
-
Powell, D.1
Bonn, G.2
Seaton, D.3
Verissimo, P.4
Waeselynck, F.5
-
17
-
-
0026155432
-
Intrusion tolerance in distributed systems
-
(Oakland, CA, USA), IEEE CS Press
-
Y. Deswarte, L. Blain, and J.-C. Fabre, "Intrusion Tolerance in Distributed Systems", in Symp. on Research in Security and Privacy, (Oakland, CA, USA), pp.110-121, IEEE CS Press, 1991.
-
(1991)
Symp. on Research in Security and Privacy
, pp. 110-121
-
-
Deswarte, Y.1
Blain, L.2
Fabre, J.-C.3
-
18
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
M. J. Fischer, N. A. Lynch, and M. S. Paterson, "Impossibility of Distributed Consensus with One Faulty Process", Journal of the ACM, 32 (2), pp.374-382, 1985.
-
(1985)
Journal of the ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.S.3
-
19
-
-
0001038609
-
Practical fault tolerance
-
(New Orleans), Usenix Association, IEEE TCOS and ACM SIGOPS
-
M. Castro and B. Liskov, "Practical Fault Tolerance", in Third Symposium on Operating Systems Design and Implementation (OSDI), (New Orleans), pp. 173-186, Usenix Association, IEEE TCOS and ACM SIGOPS, 1999.
-
(1999)
Third Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 173-186
-
-
Castro, M.1
Liskov, B.2
-
20
-
-
0345757359
-
COCA: A secure distributed on-line certification authority
-
L. Zhou, F. B. Schneider, and R. v. Renesse, "COCA: A Secure Distributed On-line Certification Authority", ACM Transactions on Computer Systems, 20 (4), pp.329-368, 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Renesse, R.V.3
-
21
-
-
10644292998
-
Providing intrusion tolerance with ITUA
-
(Washington, DC), IEEE CS Press
-
M. Cukier, T. Courtney, J. Lyons, H. V. Ramasamy, W. H. Sanders, M. Seri, M. Atighetchi, P. Rubel, C. Jones, F. Webber, P. Pal, R Watro, and J. Gossett, Providing Intrusion Tolerance with ITUA", in Supplement of the 2002 International Conference on Dependable Systems and Networks (DSN'2002), (Washington, DC), IEEE CS Press, 2002.
-
(2002)
Supplement of the 2002 International Conference on Dependable Systems and Networks (DSN'2002)
-
-
Cukier, M.1
Courtney, T.2
Lyons, J.3
Ramasamy, H.V.4
Sanders, W.H.5
Seri, M.6
Atighetchi, M.7
Rubel, P.8
Jones, C.9
Webber, F.10
Pal, P.11
Watro, R.12
Gossett, J.13
-
23
-
-
0038226150
-
-
CMU/SEI-2001-TN-001, ADA388771, Software Engineering Institute, Carnegie Mellon University
-
A. P. Moore, R. J. Ellison, and R. C. Linger, Attack Modeling for Information Security and Survivability, CMU/SEI-2001-TN-001, ADA388771, Software Engineering Institute, Carnegie Mellon University, 2001.
-
(2001)
Attack Modeling for Information Security and Survivability
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
24
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
IEEE
-
O. Sheyner, J. W. Haines, S. Jha, R. Lippmann, and J. M. Wing, "Automated Generation and Analysis of Attack Graphs", in Symposium on Security and Privacy, pp.273-284, IEEE, 2002.
-
(2002)
Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.W.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
|