![]() |
![]() Malicious-and Accidental-Fault Tolerance for Internet Applications IST Research Project IST- 1 January 2000 - 28 February 2003 |
|
|
|
||||||||||
Publications - Technical ReportsThese technical reports were published about MAFTIA-related topics The listing is ordered by year.
Veríssimo, P. Neves, N.F., and Correia,M., Intrusion-Tolerant Architectures: Concepts and Design (extended)
Veríssimo, P., Intrusion Tolerance: Concepts and Design Principles. A Tutorial A.-R. Sadeghi and M. Steiner, Assumptions related to Discrete Logarithims: Why subtleties make a real difference
K. Kursawe and V. Shoup, Optimistic asynchronous atomic broadcast Correia,M., Veríssimo, P. and Neves,N.F., The Design of a COTS Real-Time Distributed Security Kernel (Extended Version)
B. Pfitzmann and M. Waidner, A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission B. Pfitzmann and M. Waidner, Composition and Integrity Preservation of Secure Reactive Systems B. Pfitzmann, M. Schunter and M. Waidner, Provably Secure Certified Mail B. Pfitzmann, M. Schunter and M. Waidner, Secure Reactive Systems P. Veríssimo, N. F. Neves and M. Correia, The middleware architecture of MAFTIA: A Blueprint (extended) I. Welch and R.J. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code I. Welch and R.J. Stroud, Kava - Using Byte code Rewriting to add Behavioural Reflection in Java |
||||||||||||
|