Intrusion-Tolerant Middleware: The Road to Automatic Security

  • Authors:
  • Paulo E. Verissimo;Nuno F. Neves;Christian Cachin;Jonathan Poritz;David Powell;Yves Deswarte;Robert Stroud;Ian Welch

  • Affiliations:
  • University of Lisbon, Portugal;University of Lisbon, Portugal;IBM Zurich Research;IBM Zurich Research;Laboratory for Analysis and Architecture of Systems, CNRS;Laboratory for Analysis and Architecture of Systems, CNRS;University of Newcastle upon Tyne;University of Newcastle upon Tyne

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The pervasive interconnection of systems throughout the world has given computer services a significant socioeconomic value that both accidental faults and malicious activity can affect. The classical approach to security has mostly consisted of trying to prevent bad things from happening--by developing systems without vulnerabilities, for example, or by detecting attacks and intrusions and deploying ad hoc countermeasures before any part of the system is damaged. But what if we could address both faults and attacks in a seamless manner, through a common approach to security and dependability?