Malicious-and Accidental-Fault Tolerance for Internet Applications
IST Research Project IST-1999-11583
1 January 2000 - 28 February 2003

Check out a summary of the project, or browse through the original project proposal.

MAFTIA involved experts from 5 countries and 6 organisations. The Industrial Advisory Board provided valuable feedback on the work of the project.

Research was organised into six workpackages.

Find out more about the key scientific results and achievements, and the benefits of this research collaboration.




Final Workshop
Held at Newcastle University, 18-19 February, 2003.



Deliverables
All the MAFTIA deliverables in one place.



Publications
A list of MAFTIA-related papers published by members of the project.



http://www.research.ec.org/dsos/index.html

http://www.research.ec.org/cabernet/

Deliverables

These are all the deliverables from the project, in pdf format. Each deliverable is associated with a workpackage, and these are also listed. A list of the key deliverables is also available.

Conceptual Model and Architecture
Reference Model and Use Cases (516K)
Architecture and Revised Model of MAFTIA (819K)
Conceptual Model and Architecture of MAFTIA (2.7M)
Architectural Analysis of MAFTIA's Intrusion Tolerance Capabilities (359K)
Dependable Middleware
Service and Protocol Architecture for the MAFTIA Middleware (522K)
First Specification of APIs and Protocols for MAFTIA Middleware (579K)
Running Lab Prototype of MAFTIA Middleware (227K)
Complete Specification of APIs and Protocols for the MAFTIA Middleware (2M)
Intrusion Detection
Taxonomy of Intrusion Detection Systems and Vulnerabilities (1.1M)
Design of an Intrusion-Tolerant Intrusion Detection System (1M)
Trusted Third Parties
Specification of Dependable Trusted Third Parties (703K)
Full Design of Dependable Third Party Services (182K)
Distributed Authorisation
Specification of Authorisation Services (652K)
Design of the Local Authorisation Checker (388K)
Verification and Assessment
Formal Model of Basic Concepts (895K)
Specification and Verification of Selected Intrusion Tolerance Properties in CSP (922K)
Cryptographic Semantics for Algebraic Model (694K)
Final Report on Verification and Assessment (871K)