Malicious-and Accidental-Fault Tolerance for Internet Applications
IST Research Project IST-
1 January 2000 - 28 February 2003

Check out a summary of the project, or browse through the original project proposal.

MAFTIA involved experts from 5 countries and 6 organisations. The Industrial Advisory Board provided valuable feedback on the work of the project.

Research was organised into six workpackages.

Find out more about the key scientific results and achievements, and the benefits of this research collaboration.




Final Workshop
Held at Newcastle University, 18-19 February, 2003.



Deliverables
All the MAFTIA deliverables in one place.



Publications
A list of MAFTIA-related papers published by members of the project.



http://www.research.ec.org/dsos/index.html

http://www.research.ec.org/cabernet/

Goals related to verification and assessment

Our first goal is to provide rigorous definitions of the basic concepts developed by MAFTIA. The concise but informal models of intrusion tolerance that will be developed elsewhere in the project will be sufficient for most purposes, but a formal assessment requires a more precise understanding of the concepts.

The second goal is to validate results of the work on dependable middleware using a formal specification language and automatic verification tools (primarily model-checking). Protocols that use cryptographic primitives (in particular for dependable trusted third parties) will also be verified manually as part of their design, using standard cryptographic techniques.

The third specific assessment goal is to connect the fully formal techniques, which greatly idealise cryptographic primitives, with the more realistic complexity-theoretic cryptographic models which are so far not accessible to automatic checking of proofs.