The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2006 vol. 4)
ISSN: 1540-7993
pp: 54-62
Yves Deswarte , Laboratory for Analysis and Architecture of Systems, CNRS
Christian Cachin , IBM Zurich Research
David Powell , Laboratory for Analysis and Architecture of Systems, CNRS
Robert Stroud , University of Newcastle upon Tyne
Paulo E. Ver?ssimo , University of Lisbon, Portugal
Ian Welch , University of Newcastle upon Tyne
Nuno F. Neves , University of Lisbon, Portugal
Jonathan Poritz , IBM Zurich Research
The pervasive interconnection of systems throughout the world has given computer services a significant socioeconomic value that both accidental faults and malicious activity can affect. The classical approach to security has mostly consisted of trying to prevent bad things from happening--by developing systems without vulnerabilities, for example, or by detecting attacks and intrusions and deploying ad hoc countermeasures before any part of the system is damaged. But what if we could address both faults and attacks in a seamless manner, through a common approach to security and dependability?
fault tolerance, intrusion tolerance, intrusion detection
Yves Deswarte, Christian Cachin, David Powell, Robert Stroud, Paulo E. Ver?ssimo, Ian Welch, Nuno F. Neves, Jonathan Poritz, "Intrusion-Tolerant Middleware: The Road to Automatic Security", IEEE Security & Privacy, vol. 4, no. , pp. 54-62, July/August 2006, doi:10.1109/MSP.2006.95
87 ms
(Ver 3.3 (11022016))