The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Organization based access control
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications
IEEE Transactions on Dependable and Secure Computing
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Resilient State Machine Replication
PRDC '05 Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing
Using Attack Injection to Discover New Vulnerabilities
DSN '06 Proceedings of the International Conference on Dependable Systems and Networks
Intrusion-Tolerant Middleware: The Road to Automatic Security
IEEE Security and Privacy
Intrusion-tolerant architectures: concepts and design
Architecting dependable systems
IEEE Spectrum
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
Information Security Tech. Report
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Architecting Dependable Systems V
Hi-index | 0.00 |
In the past few decades, critical infrastructures have become largely computerised and interconnected all over the world. This generated the problem of achieving resilience of critical information infrastructures against computer-borne attacks and severe faults. Governments and industry have been pushing an immense research effort in information and systems security, but we believe the complexity of the problem prevents it from being solved using classical security methods. The paper focuses on the computer systems behind electrical utility infrastructures. It proposes the blueprint of a distributed systems architecture that we believe may come to be useful as a reference for modern critical information infrastructures in general. The architecture is instantiated with a set of classes of techniques and algorithms, based on paradigms providing resilience to faults and attacks in an automatic way.