![]() |
![]() Malicious-and Accidental-Fault Tolerance for Internet Applications IST Research Project IST- 1 January 2000 - 28 February 2003 |
|
|
|
|||||||||||||
Publications - Other TypesThese publications, authored by MAFTIA members, are related to MAFTIA and were published during the project.
Ian Welch and Robert J. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code, Journal of Computer Security, Vol: 10 Ian Welch and Robert Stroud, Re-engineering Security as a Crosscutting Concern - Experience with a Third Party Application,
EuroCrypt 2001, Pfitzmann, B. (ed),
K. Julisch, Data Mining for Intrusion Detection - A Critical Review, in Applications of Data Mining in Computer Security, D. Barbera and S. Jajodia (eds.) Welch, I. and Stroud, R. J., Kava - A Reflective Java Based on Bytecode Rewriting, in Reflection and Software Engineering, Cazzola, Walter and Stroud, Robert J. and Tisato, Francesco (eds), Vol: 1826
Schunter, M., Optimistic Fair Exchange, Technische Fakultat der Universitat des Saarlandes, Saarbrucken, October 2002 Steiner, M., Secure Group Key Agreement, Naturwissenschaftlich-Technische Fakultat der Universitat des Saarlandes, Saarbrucken, March 2002 Welch, I., Implementing Reflective Security Architectures for Applications, Department of Computing Science, University of Newcastle upon Tyne, 2002
Kursawe, K. and Shoup, V., Optimistic Asynchronous Atomic Broadcast, Cryptology ePrint Archive, Report 2001/022, 2001 Veríssimo, P., Neves, N.F. and Correia,M., Intrusion-Tolerant Architectures: Concepts and Design Veríssimo, P., Uncertainty and Predictability: Can they be reconciled?
|
|||||||||||||||
|
|