The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2006 vol.4)
pp: 54-62
Paulo E. Ver?ssimo , University of Lisbon, Portugal
Nuno F. Neves , University of Lisbon, Portugal
Christian Cachin , IBM Zurich Research
Jonathan Poritz , IBM Zurich Research
David Powell , Laboratory for Analysis and Architecture of Systems, CNRS
Yves Deswarte , Laboratory for Analysis and Architecture of Systems, CNRS
Robert Stroud , University of Newcastle upon Tyne
Ian Welch , University of Newcastle upon Tyne
ABSTRACT
The pervasive interconnection of systems throughout the world has given computer services a significant socioeconomic value that both accidental faults and malicious activity can affect. The classical approach to security has mostly consisted of trying to prevent bad things from happening--by developing systems without vulnerabilities, for example, or by detecting attacks and intrusions and deploying ad hoc countermeasures before any part of the system is damaged. But what if we could address both faults and attacks in a seamless manner, through a common approach to security and dependability?
INDEX TERMS
fault tolerance, intrusion tolerance, intrusion detection
CITATION
Paulo E. Ver?ssimo, Nuno F. Neves, Christian Cachin, Jonathan Poritz, David Powell, Yves Deswarte, Robert Stroud, Ian Welch, "Intrusion-Tolerant Middleware: The Road to Automatic Security", IEEE Security & Privacy, vol.4, no. 4, pp. 54-62, July/August 2006, doi:10.1109/MSP.2006.95
107 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool