Conceptual Model and Architecture of MAFTIA

The files are stored in PDF, with the report number as filename. Alternatively, reports are available by post from the above address.

[1]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[2]  Algirdas Avizienis,et al.  Design of fault-tolerant computers , 1967, AFIPS '67 (Fall).

[3]  William C. Carter,et al.  Design of dynamically checked computers , 1968, IFIP Congress.

[4]  W. C. Carter,et al.  Reliability modeling techniques for self-repairing computer systems , 1969, ACM '69.

[5]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[6]  S. Yau,et al.  Design of self-checking software , 1975, Reliable Software.

[7]  Brian Randell,et al.  System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.

[8]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[9]  Software reliability: The role of programmed exception handling , 1976 .

[10]  B. P. Ziegler,et al.  Theory of Modeling and Simulation , 1976 .

[11]  Ellis S. Cohen Information transmission in computational systems , 1977, SOSP '77.

[12]  John F. Wakerly,et al.  Error detecting codes, self-checking circuits and applications , 1978 .

[13]  A. Avizienis,et al.  Fault-tolerance: The survival attribute of digital systems , 1978, Proceedings of the IEEE.

[14]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[16]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[17]  Richard J. Feiertag A Technique for Proving Specifications are Multilevel Secure , 1980 .

[18]  James P. Black,et al.  Redundancy in Data Structures: Improving Software Fault Tolerance , 1980, IEEE Transactions on Software Engineering.

[19]  M. Y. Hsiao,et al.  A System Solution to the Memory Soft Error Problem , 1980, IBM J. Res. Dev..

[20]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[21]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[22]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[23]  Flaviu Cristian,et al.  Exception Handling and Software Fault Tolerance , 1982, IEEE Transactions on Computers.

[24]  Jacob A. Abraham,et al.  LBW COST SCEEMES FOR FAULT TOLEEANCE IN MATRIX OPERATIONS WITH PROCESSOR ARRAYS , 1982 .

[25]  Donald A. Norman,et al.  Design rules based on analyses of human error , 1983, CACM.

[26]  Andreas Reuter,et al.  Principles of transaction-oriented database recovery , 1983, CSUR.

[27]  Mike St. Johns Authentication service , 1984, RFC.

[28]  Sam Toueg,et al.  Asynchronous consensus and broadcast protocols , 1985, JACM.

[29]  David Powell,et al.  A fault- and intrusion- tolerant file system , 1985 .

[30]  P. M. Melliar-Smith,et al.  Synchronizing clocks in the presence of faults , 1985, JACM.

[31]  Bowen Alpern,et al.  Defining Liveness , 1984, Inf. Process. Lett..

[32]  D. K. Pradhan Fault-tolerant multiprocessor and VLSI-based system communication architectures , 1986 .

[33]  D. Wilson The STRATUS computer system , 1986 .

[34]  Yves Deswarte,et al.  Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering , 1986, 1986 IEEE Symposium on Security and Privacy.

[35]  Jim Gray,et al.  Why Do Computers Stop and What Can Be Done About It? , 1986, Symposium on Reliability in Distributed Software and Database Systems.

[36]  Hermann Kopetz,et al.  Clock Synchronization in Distributed Real-Time Systems , 1987, IEEE Transactions on Computers.

[37]  Özalp Babaoglu,et al.  On the reliability of consensus-based fault-tolerant distributed computing systems , 1987, TOCS.

[38]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[39]  Algirdas Avizienis,et al.  A fault tolerance approach to computer viruses , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[40]  Paulo Veríssimo,et al.  The Delta-4 approach to dependability in open distributed computing systems , 1988, [1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[41]  Flaviu Cristian,et al.  Agreeing on who is present and who is absent in a synchronous distributed system , 1988, [1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[42]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[43]  Bernard Courtois,et al.  A generalized theory of fail-safe systems , 1989, [1989] The Nineteenth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[44]  Yves Deswarte,et al.  An Intrusion-Tolerant Security Server for an Open Distributed System , 1990, ESORICS.

[45]  Jim Gray,et al.  A census of Tandem system availability between 1985 and 1990 , 1990 .

[46]  Hermann Kopetz,et al.  Fault tolerance, principles and practice , 1990 .

[47]  Yves Deswarte,et al.  Intrusion-Tolerant Security Servers for Delta-4 , 1990 .

[48]  Jean Arlat,et al.  Definition and analysis of hardware- and software-fault-tolerant architectures , 1990, Computer.

[49]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[50]  James W. Gray,et al.  Toward a mathematical foundation for information flow security , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[51]  Dhiraj K. Pradhan,et al.  Consensus With Dual Failure Modes , 1991, IEEE Trans. Parallel Distributed Syst..

[52]  Jan Noyes,et al.  Human Error in the Cockpit , 1991 .

[53]  Li Gong,et al.  A security risk of depending on synchronized clocks , 1992, OPSR.

[54]  Gustavus J. Simmons,et al.  An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789. , 1992 .

[55]  Mladen A. Vouk,et al.  On operational availability of a large software-based telecommunications system , 1992, [1992] Proceedings Third International Symposium on Software Reliability Engineering.

[56]  N. Lynch,et al.  Atomic Transactions , 1993, Morgan Kaufmann series in data management systems.

[57]  Gérard D. Guiho,et al.  SACEM: A fault tolerant system for train speed control , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.

[58]  Brian Randell,et al.  Designing Secure and Reliable Applications using FRS: An Object-Oriented Approach , 1993 .

[59]  Pascal Traverse,et al.  AIRBUS A320/A330/A340 electrical flight controls - A family of fault-tolerant systems , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.

[60]  Carl E. Landwehr,et al.  A taxonomy of computer program security flaws , 1993, CSUR.

[61]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[62]  Karl-Erwin Großpietsch,et al.  Fault tolerance , 1994, IEEE Micro.

[63]  Birgit Pfitzmann,et al.  A General Framework for Formal Notions of "Secure" Systems , 1994 .

[64]  Torleiv Kløve,et al.  Error detecting codes , 1995 .

[65]  S. G. Frison,et al.  INTERACTIVE CONSISTENCY AND ITS IMPACT ON THE DESIGN IN TMR SYSTEMS , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..

[66]  J-C. Laprie,et al.  DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..

[67]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[68]  Heinz Kantz,et al.  The ELEKTRA railway signalling system: field experience with an actively replicated system with diversity , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[69]  Flaviu Cristian,et al.  Atomic Broadcast: From Simple Message Diffusion to Byzantine Agreement , 1995, Inf. Comput..

[70]  Robert W. Horst,et al.  A flexible ServerNet-based fault-tolerant architecture , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[71]  Harold Joseph Highland,et al.  AIN'T misbehaving—A taxonomy of anti-intrusion techniques , 1995 .

[72]  Claudia Eckert On security models , 1996, SEC.

[73]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[74]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[75]  Katherine Guo,et al.  A transparent light-weight group service , 1996, Proceedings 15th Symposium on Reliable Distributed Systems.

[76]  Sam Toueg,et al.  Unreliable failure detectors for reliable distributed systems , 1996, JACM.

[77]  Andrew William Roscoe,et al.  The Theory and Practice of Concurrency , 1997 .

[78]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[79]  D. Richard Kuhn,et al.  Sources of Failure in the Public Switched Telephone Network , 1997, Computer.

[80]  Nancy R. Mead,et al.  Survivable Network Systems: An Emerging Discipline , 1997 .

[81]  Richard D. Regan,et al.  Availability in Parallel Systems: Automatic Process Restart , 1997, IBM Syst. J..

[82]  F. Schneider Trust in Cyberspace , 1998 .

[83]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[84]  Mary Ellen Zurko,et al.  A user-centered, modular authorization service built on an RBAC foundation , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[85]  P. Veríssimo,et al.  Time, clocks and temporal order , 1999 .

[86]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[87]  Bill Roscoe,et al.  Data independence with predicate symbols , 1999 .

[88]  Ranko S. Lazic,et al.  A semantic study of data independence with applications to model checking , 1999 .

[89]  Paulo Veríssimo,et al.  Topology-Aware Algorithms for Large-Scale Communication , 1999, Advances in Distributed Systems.

[90]  S. J. Creese,et al.  Verifying End-to-End Protocols using Induction with CSP/FDR , 1999, IPPS/SPDP Workshops.

[91]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[92]  Fabio Martinelli,et al.  A Uniform Approach for the Definition of Security Properties , 1999, World Congress on Formal Methods.

[93]  Steve H. Weingart Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.

[94]  Paul Dischamp,et al.  Power Analysis, What Is Now Possible , 2000, ASIACRYPT.

[95]  Marc Dacier,et al.  Reference Model and Use Cases , 2000 .

[96]  Anita K. Jones The Challenge of Building Survivable Information-Intensive Systems - Guest Editor's Introduction , 2000, Computer.

[97]  Brian Randell,et al.  Fundamental Concepts of Dependability , 2000 .

[98]  Fred B. Schneider,et al.  Enforceable security policies , 2000, TSEC.

[99]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[100]  Carleen Maitland,et al.  Trust in cyberspace , 2000 .

[101]  Lee Garber,et al.  Denial-of-Service Attacks Rip the Internet , 2000, Computer.

[102]  Birgit Pfitzmann,et al.  SEMPER - Secure Electronic Marketplace for Europe , 2000, Lecture Notes in Computer Science.

[103]  Peter Y. A. Ryan,et al.  Mathematical Models of Computer Security , 2000, FOSAD.

[104]  Antonio Casimiro,et al.  The timely computing base: Timely actions in the presence of uncertain timeliness , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[105]  Miguel Correia,et al.  First Specification of APIs and Protocols for the MAFTIA Middleware , 2001 .

[106]  Dominique Alessandri,et al.  Towards a Taxonomy of Intrusion Detection Systems and Attacks , 2001 .

[107]  Luís E. T. Rodrigues,et al.  Appia, a flexible protocol kernel supporting multiple coordinated channels , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[108]  S. J. Creese,et al.  Data independent induction : CSP model checking or arbitary sized networks , 2001 .

[109]  Yves Deswarte,et al.  An Internet Authorization Scheme Using Smart-Card-Based Security Kernels , 2001, E-smart.

[110]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[111]  Christian Cachin,et al.  Distributing trust on the Internet , 2001, 2001 International Conference on Dependable Systems and Networks.

[112]  Joy Boy Joy Eu Specification of Dependable Trusted Third Parties , 2001 .

[113]  Vincent Nicomette,et al.  Specification of Authorisation Services , 2001 .

[114]  Birgit Pfitzmann,et al.  A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[115]  Birgit Pfitzmann,et al.  Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation , 2002, FME.

[116]  Ahmad-Reza Sadeghi,et al.  Final Report on Verification and Assessment , 2002 .

[117]  C. Cachin,et al.  Full Design of Dependable Third Party Services , 2002 .

[118]  Michael Backes,et al.  Cryptographically sound analysis of security protocols , 2002 .

[119]  Marc Dacier,et al.  Design of an Intrusion-Tolerant Intrusion Detection System , 2002 .

[120]  정희영,et al.  IETF에서의 빠른 핸드오프 기술 표준화 동향 , 2002 .

[121]  C. Cachin Malicious- and Accidental-Fault Tolerance for Internet Applications Specification of Dependable Trusted Third Parties , 2001 .

[122]  J. van Leeuwen,et al.  Information Security , 2003, Lecture Notes in Computer Science.

[123]  Sadie Creese,et al.  Malicious- and Accidental-Fault Tolerance for Internet Applications Specification and verification of selected intrusion tolerance properties using CSP and FDR , 2003 .

[124]  Peter Y. A. Ryan,et al.  Architectural Analysis of MAFTIA's Intrusion Tolerance Capabilities , 2003 .

[125]  Antonio Casimiro,et al.  CesiumSpray: a Precise and Accurate Global Time Service for Large-scale Systems , 1997, Real-Time Systems.

[126]  Victor Shoup,et al.  Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography , 2000, Journal of Cryptology.

[127]  F. Lemmermeyer Error-correcting Codes , 2005 .