Malicious-and Accidental-Fault Tolerance for Internet Applications
IST Research Project IST-1999-11583
1 January 2000 - 28 February 2003

Check out a summary of the project, or browse through the original project proposal.

MAFTIA involved experts from 5 countries and 6 organisations. The Industrial Advisory Board provided valuable feedback on the work of the project.

Research was organised into six workpackages.

Find out more about the key scientific results and achievements, and the benefits of this research collaboration.




Newcastle
Brian Randell and Robert Stroud were the principal researchers at Newcastle.
Publications...



Lisboa
Paulo Veríssimo and Nuno Ferreira Neves led investigations at Lisboa.
Publications...



QinetiQ
QinetiQ's research was led by Colin O'Halloran and Sadie Creese.
Publications...



Saarland
Birgit Pfitzmann (now at IBM Zurich), Michael Steiner (now at IBM Thomas Watson), and André Adelsbach led the research at Saarland.
Publications...



LAAS-CNRS
Research at LAAS was led by David Powell and Yves Deswarte.
Publications...



IBM Zurich
Michael Waidner, Marc Dacier (now at Institut Eurécom), Andreas Wespi and Christian Cachin led the work at IBM Zurich.
Publications...

University of Newcastle: Publications

This is a list of MAFTIA-related publications from Newcastle University.

I.S. Welch and R.J. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
In Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000), Toulouse, France, October 2000, pp. 309-323
LNCS 1985, Springer-Verlag, 2000

Welch, I. and Stroud, R. J., Kava - A Reflective Java Based on Bytecode Rewriting, in Reflection and Software Engineering, Cazzola, Walter and Stroud, Robert J. and Tisato, Francesco (eds), Vol: 1826
Springer-Verlag, pp 157-169, 2000

I. Welch and R. Stroud, Kava - Using Bytecode Rewriting to add Behavioural Reflection to Java
In Proceedings of the USENIX Conference on Object-Oriented Technology (COOTS'01), pp. 119-130

I. Welch, R. Stroud and A. Romanovsky, Aspects of Exceptions at the Meta Level
In Proceedings of the Third International Conference in Reflection 2001, Kyoto, Japan, pp. 280-282 LNCS 2192, Springer-Verlag, 2001

I. Welch, R. J. Stroud and A. Romanovsky, Aspects of Exceptions at the Meta-Level
In Proceedings of the International Workshop on Aspect Oriented Programming and Separation of Concerns, Computing Department, Lancaster University, 2001
Technical Report No. CSEG/03/01

I. Welch and R. Stroud, Security and Aspects: A Metaobjects Protocol Viewpoint
In Proceedings of the Workshop on Aspects, Components and Patterns for Infrastructure Software at the 1st International Conference on Aspect-Oriented Software Development, 2002
ACM Sigsoft and ACM Sigplan, 2002

Ian Welch and Robert J. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code, Journal of Computer Security, Vol: 10
IOS Press, Netherlands, pp 399-432, 2002

Welch, I., Implementing Reflective Security Architectures for Applications, Department of Computing Science, University of Newcastle upon Tyne, 2002

Ian Welch and Robert Stroud, Re-engineering Security as a Crosscutting Concern - Experience with a Third Party Application,
to appear in the special edition of the British Computing Society Journal on Aspect Oriented Programming and Separation of Concerns

I. Welch and R.J. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Department of Computing Science, University of Newcastle, CS-TR: 705, 2000
Available from http://www.cs.ncl.ac.uk/ [ Abstract ] [ pdf ] [ ps ]

I. Welch and R.J. Stroud, Kava - Using Byte code Rewriting to add Behavioural Reflection in Java
Department of Computing Science, University of Newcastle,CS-TR: 704 2000
Available from http://www.cs.ncl.ac.uk/ [ Abstract ] [ pdf ] [ ps ]

All Partners

D. Powell, A. Adelsbach, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, T. McCutcheon, N. Neves, B. Pfitzmann, B. Randell, R. Stroud, P. VerÝssimo, M. Waidner, MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications)
In Sup. of the Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN2001), G÷teborg (Sweden), 1-4 July 2001, pp. D-32-D-35