Intrusion Tolerance
5 Followers
Recent papers in Intrusion Tolerance
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusiontolerant system... more
We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on... more
Abstract—We propose a resilience architecture for improving the security and dependability of authentication and au-thorization infrastructures, in particular the ones based on RADIUS and OpenID. This architecture employs... more
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusiontolerant system... more
The same network infrastructure, that is essential for the operation of today's high valued distributed information systems, can also be misused by malicious attackers. Experience shows that implementing absolute security or... more
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusiontolerant system... more
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconnections and security against malicious actions. Tuple... more
Intrusion tolerance has been proposed as a new paradigm for computer systems security. The idea is to apply the fault tolerance paradigm in the domain of systems security accepting that malicious faults (attacks, intrusions) can never be... more