Intrusion-tolerant middleware: The road to automatic security

PE Veríssimo, NF Neves, C Cachin… - IEEE Security & …, 2006 - ieeexplore.ieee.org
The pervasive interconnection of systems throughout the world has given computer services
a significant socioeconomic value that both accidental faults and malicious activity can …

[PDF][PDF] Intrusion-resilient middleware design and validation

P Verissimo, M Correia, NF Neves… - … Assurance, Security and …, 2009 - academia.edu
Intrusion Tolerance has become a reference paradigm for dealing with intrusions and
accidental faults, achieving security and dependability in an automatic way, much along the …

Adaptive cyberdefense for survival and intrusion tolerance

M Atighetchi, P Pal, F Webber, R Schantz… - IEEE Internet …, 2004 - ieeexplore.ieee.org
While providing some resistance against cyberattacks, current approaches to securing
networked and distributed information systems are mainly concerned with static prevention …

A comparison of intrusion-tolerant system architectures

Q Nguyen, A Sood - IEEE Security & Privacy, 2010 - ieeexplore.ieee.org
Comparative Analysis of Intrusion-Tolerant System Architectures Page 1 1 Comparative
Analysis of Intrusion-Tolerant System Architectures Quyen L. Nguyen1 and Arun Sood1,2 …

An architecture for adaptive intrusion‐tolerant applications

P Pal, P Rubel, M Atighetchi, F Webber… - Software: Practice …, 2006 - Wiley Online Library
Applications that are part of a mission‐critical information system need to maintain a usable
level of key services through ongoing cyber‐attacks. In addition to the well‐publicized denial …

A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture

R Stroud, I Welch, J Warne… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
MAFTIA was a three-year European research project that explored the use of fault-tolerance
techniques to build intrusion-tolerant systems. The MAFTIA architecture embodies a number …

Analysis of techniques for building intrusion tolerant server systems

F Wang, R Uppalli, C Killian - IEEE Military Communications …, 2003 - ieeexplore.ieee.org
The theme of intrusion detection systems (IDS) is detection because prevention mechanisms
alone are not guaranteed to keep intruders out. The research focus of IDS is therefore on …

Intrusion-tolerant architectures: Concepts and design

PE Veríssimo, NF Neves, MP Correia - Architecting dependable systems, 2007 - Springer
There is a significant body of research on distributed computing architectures,
methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they …

Intrusion tolerant software architectures

V Stavridou, B Dutertre… - … and Exposition II …, 2001 - ieeexplore.ieee.org
The complexity of the software systems built today virtually guarantees the existence of
security vulnerabilities. When the existence of specific vulnerabilities becomes known …

[PDF][PDF] An adaptive intrusion-tolerant server architecture

A Valdes, M Almgren, S Cheung… - Proceedings of the …, 2002 - academia.edu
We describe a general architecture for intrusion-tolerant enterprise systems and the
implementation of an intrusion-tolerant Web server as a specific instance. The architecture …