Eclipses by circumstellar material in the T Tauri star AA Tau-II. Evidence for non-stationary magnetospheric accretion

J Bouvier, KN Grankin, SHP Alencar… - Astronomy & …, 2003 - aanda.org
We report the results of a synoptic study of the photometric and spectroscopic variability of
the classical T Tauri star AA Tau on timescales ranging from a few hours to several weeks …

Intrusion-tolerant middleware: The road to automatic security

PE Veríssimo, NF Neves, C Cachin… - IEEE Security & …, 2006 - ieeexplore.ieee.org
The pervasive interconnection of systems throughout the world has given computer services
a significant socioeconomic value that both accidental faults and malicious activity can …

[PDF][PDF] Conceptual model and architecture of MAFTIA

D Powell, R Stroud - … Series-University of Newcastle Upon Tyne …, 2003 - maftia.cs.ncl.ac.uk
Conceptual Model and Architecture of MAFTIA Page 1 Project IST-1999-11583 Malicious- and
Accidental-Fault Tolerance for Internet Applications Conceptual Model and Architecture of …

Achieving critical system survivability through software architectures

JC Knight, EA Strunk - Architecting Dependable Systems II, 2004 - Springer
Software-intensive systems often exhibit dimensions in size and complexity that exceed the
scope of comprehension of system designers and analysts. With this complexity comes the …

[PDF][PDF] Multi-orbac: A new access control model for distributed, heterogeneous and collaborative systems

A Abou El Kalam, Y Deswarte - … of the IEEE Symposium on Systems …, 2006 - webhost.laas.fr
This paper presents a new access control model for collaborative, heterogeneous and
distributed systems: the MultiOrganization-Based Access Control (Multi-OrBAC). Multi …

Immuno-inspired autonomic system for cyber defense

D Dasgupta - information security technical report, 2007 - Elsevier
The biological immune system is an autonomic system for self-protection, which has evolved
over millions of years probably through extensive redesigning, testing, tuning and …

Internet security: an intrusion-tolerance approach

Y Deswarte, D Powell - Proceedings of the IEEE, 2006 - ieeexplore.ieee.org
The Internet has become essential to most enterprises and many private individuals.
However, both the network and computer systems connected to it are still too vulnerable and …

Conceptual model and architecture of MAFTIA

A Adelsbach, C Cachin, S Creese, Y Deswarte… - 2003 - repositorio.ul.pt
This deliverable builds on the work reported in [MAFTIA 2000] and [Powell and Stroud
2001]. It contains a further refinement of the MAFTIA conceptual model and a revised …

A qualitative analysis of the intrusion-tolerance capabilities of the MAFTIA architecture

R Stroud, I Welch, J Warne… - … on Dependable Systems …, 2004 - ieeexplore.ieee.org
MAFTIA was a three-year European research project that explored the use of fault-tolerance
techniques to build intrusion-tolerant systems. The MAFTIA architecture embodies a number …

[PDF][PDF] Building dependable and secure Web services.

LE Moser, PM Melliar-Smith, W Zhao - J. Softw., 2007 - academia.edu
Web Services offer great promise for integrating and automating software applications within
and between enterprises over the Internet. However, ensuring that Web Services can satisfy …