Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Model-Carrying Code (MCC): a new paradigm for mobile-code security
Proceedings of the 2001 workshop on New security paradigms
Model-carrying code: a practical approach for safe execution of untrusted applications
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Scaling up SLA monitoring in pervasive environments
International workshop on Engineering of software services for pervasive environments: in conjunction with the 6th ESEC/FSE joint meeting
Enhancing Java ME Security Support with Resource Usage Monitoring
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Reputation Propagation in Composite Services
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
Integrating Behavioral Trust in Web Service Compositions
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
T2D: a peer to peer trust management system based on disposition to trust
Proceedings of the 2010 ACM Symposium on Applied Computing
Security-by-contract: toward a semantics for digital signatures on mobile code
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
On-the-fly interoperability through automated mediator synthesis and monitoring
ISoLA'10 Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part II
Dependability analysis and verification for CONNECTed systems
ISoLA'10 Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part II
Hi-index | 0.00 |
The EU Future and Emerging Technologies (FET) Project Connect aims at dropping the heterogeneity barriers that prevent the eternality of networking systems through a revolutionary approach: to synthesise on-the-fly the Connectors via which networked systems communicate. The Connect approach, however, comes at risk from the standpoint of dependability, stressing the need for methods and tools that ensure resilience to faults, errors and malicious attacks of the dynamically Connected system. We are investigating a comprehensive approach, which combines dependability analysis, security enforcement and trust assessment, and is centred around a lightweight adaptive monitoring framework. In this project paper, we overview the research that we are undertaking towards this objective and propose a unifying workflow process that encompasses all the Connect dependability/security/trust concepts and models.