Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Hardening Botnet by a Rational Botmaster
Information Security and Cryptology
Intrusion-tolerant architectures: concepts and design
Architecting dependable systems
Security and Communication Networks
Hi-index | 0.00 |
Despite our best efforts, any sufficiently complex computer system hasvulnerabilities. It is safe to assume that such vulnerabilities can beexploited by attackers who will be able to penetrate the system.Intrusion tolerance attempts to maintain acceptable service despitesuch intrusions. This paper presents an application ofintrusion-tolerance concepts to Enclaves, a software infrastructurefor supporting secure group applications. Intrusion tolerance isachieved via a combination of Byzantine fault-tolerant protocols andsecret sharing techniques.