Malicious-and Accidental-Fault Tolerance for Internet Applications
IST Research Project IST-1999-11583
1 January 2000 - 28 February 2003

Check out a summary of the project, or browse through the original project proposal.

MAFTIA involved experts from 5 countries and 6 organisations. The Industrial Advisory Board provided valuable feedback on the work of the project.

Research was organised into six workpackages.

Find out more about the key scientific results and achievements, and the benefits of this research collaboration.




Final Workshop
Held at Newcastle University, 18-19 February, 2003.



Deliverables
All the MAFTIA deliverables in one place.



Publications
A list of MAFTIA-related papers published by members of the project.



http://www.research.ec.org/dsos/index.html

http://www.research.ec.org/cabernet/

Publications - Conference Papers

These conference papers were published about MAFTIA-related topics The listing is ordered by year.

2003

Backes, M. and Cachin, C., Reliable broadcast in a computational hybrid model with Byzantine faults, crashes, and recoveries
In Proceedings of the International Conference on Dependable Systems and Networks (DSN-2003), June 2003
Available from http://www.zurich.ibm.com/~cca/papers/hybrid.pdf

Cachin, C., Modeling complexity in secure distributed computing
In André Schiper, Alexander A. Shvartsman, Hakim Weatherspoon, and Ben Y. Zhao (eds), Future Directions in Distributed Computing, Lecture Notes in
Computer Science, Vol: 2584, pp 57-61. Springer, 2003.
Available from http://www.zurich.ibm.com/~cca/papers/fudico.pdf

Cheuk Lung, L., Correia, M., Neves,N.F. and Veríssimo, P., A Simple Intrusion-Tolerant Reliable Multicast Protocol using the TTCB
21º Simpósio Brasileiro de Redes de Computadores. Natal, Brasil, May 2003
Available from http://www.di.fc.ul.pt/~mpc/brmt.pdf

2002

I. Welch and R. Stroud, Security and Aspects: A Metaobjects Protocol Viewpoint
In Proceedings of the Workshop on Aspects, Components and Patterns for Infrastructure Software at the 1st International Conference on Aspect-Oriented Software Development, 2002
ACM Sigsoft and ACM Sigplan, 2002

C. Cachin , K. Kursawe , A. Lysyanskaya , and R. Strobl, Asynchronous Verifiable Secret Sharing and Proactive Crypto Systems
In Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2002, pp. 88-97
Available from http://www.zurich.ibm.com/~cca/papers/ap.pdf

M. Backes, C. Jacobi, and B. Pfitzmann, Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation
In Proceedings of Formal Methods Europe 2002 (FME '02), pp.310-359
Lecture Notes in Computer Science 2391, Springer-Verlag, Berlin, 2002

M. Backes, B. Pfitzmann, M. Steiner, and M. Waidner, Polynomial Fairness and Liveness
In Proceedings of the 15th Computer Security Foundations Workshop (CFSW 2002), Cape Breton, Nova Scotia, 2002, IEEECSP, pp 160-174

M. Correia , P. Verissimo , N. F. Neves, The Design of COTS Real-Time Distributed Security Kernel
In Proceedings of the 4th European Dependable Computing Conference (EDCC) Toulouse, France, October 2002, pp 234-252
Available from http://www.navigators.di.fc.ul.pt/archive/ttcb-edcc.ps

K. Kursawe, Asynchronous Byzantine Group Communication
In Proceedings of the Workshop on Reliable P2P Distributed Systems (RPPDS 2002), October 2002
IEEE Computer Society Press, pp 352-357

K. Kursawe, Optimistic Byzantine Agreement
In Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), October 2002, pp 262-267
IEEE Computer Society Press

M. Correia , L. Lung, N. F. Neves, P. Verissimo, Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model
In Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS), Osaka, Japan, October 2002 pp 2-11
Available from http://www.navigators.di.fc.ul.pt/archive/brm-srds02.ps

Y. Deswarte, N. Abghour, V. Nicomette, D. Powell, An Intrusion-Tolerant Authorization Scheme for Internet Applications
In Sup. of the Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), Washington, D.C. (USA), 23-26 June 2002, pp. C-1.1 - C-1.6

C. Cachin and J. Poritz, Secure Intrusion Tolerant Replication on the Internet
In Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), Washington, D.C. (USA), 23-26 June 2002, pp. 167-176
Available from http://www.zurich.ibm.com/~cca/papers/sintra.pdf

2001

H. Debar and A. Wespi, Aggregation and Correlation of Intrusion-Detection Alerts
In Proceedings of Recent Advances in Intrusion Detection (RAID 2001), W. Lee, L. Mé, A. Wespi (eds.), pp. 85-103
Lecture Notes in Computer Science 2212, Springer, Berlin, Heidelberg

I. Welch, R.J. Stroud and A. Romanovsky, Aspects of Exceptions at the Meta-Level
In Proceedings of the International Workshop, Computing Department, Lancaster University, pp. 38-43
Technical Report No.CSEG/03/01

I. Welch, R. Stroud and A. Romanovsky, Aspects of Exceptions at the Meta Level
In Proceedings of the Third International Conference in Reflection 2001, pp.280-282
Lecture Notes in Computer Science 2192, Springer-Verlag

I. Welch and R. Stroud, Kava - Using Bytecode Rewriting to add Behavioural Reflection to Java
In Proceedings of the USENIX Conference on Object-Oriented Technology (COOTS'01), pp. 119-130

C. Cachin , K. Kursawe , F. Petzold and V. Shoup, Secure and Efficient Asynchronous Broadcast Protocols
In Proceedings of Advances in Cryptology: CRYPTO 2001, J. Kilian (ed), pp. 524-541
Lecture Notes in Computer Science 2139, Springer 2001
Available from http://eprint.iacr.org/2001/006

K. Julisch, Mining Alarm Clusters to Improve Alarm Handling Efficiency
In Proceedings of the 17th Annual Computer Security Applications Conf., New Orleans, LA, December 10-14, 2001

Y. Deswarte, N. Abghour, V. Nicomette, D. Powell, An Internet Authorization Scheme using Smartcard-based Security Kernels
In Smart Card Programming and Security: Proceedings of e-Smart 2001, Cannes (France), 19-22 September 2001, I. Attali and T. Jensen (eds.), pp. 71-82
Lecture Notes in Computer Science 2140, Springer

D. Powell, A. Adelsbach, C. Cachin, S. Creese, M. Dacier, Y. Deswarte, T. McCutcheon, N. Neves, B. Pfitzmann, B. Randell, R. Stroud, P. Veríssimo, M. Waidner, MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications)
In Sup. of the Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN2001), Göteborg (Sweden), 1-4 July 2001, pp. D-32-D-35

C. Cachin, Distributing trust on the Internet
In Proceedings of the Intl. Conference on Dependable Systems and Networks (DSN-2001), July 2001 pp. 183-192
Available from http://www.zurich.ibm.com/~cca/papers/dti.pdf

A.-R. Sadeghi and M. Steiner, Assumptions related to Discrete Logarithms: Why subtleties make a real difference
In Proceedings of Eurocrypt 2001, May 2001
Lecture Notes in Computer Science 2045, Springer-Verlag, pp. 243-260
Available from http://www.semper.org in [ pdf ] [ ps.gz ] format

M. Correia , P. Verissimo and N.F. Neves, The architecture of a secure group communication system based on intrusion tolerance
In Proceedings of the 21st International Conference on Distributed Computing Systems Workshops. International Workshop on Applied Reliable Group Communication (WARGC), Phoenix (USA), April 2001, pp 17-22
Available from http://www.navigators.di.fc.ul.pt/archive/argc01.pdf

B. Pfitzmann, M. Waidner, A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, USA, 2001, pp 184- 200

2000

B. Pfitzmann and M. Waidner, Composition and integrity preservation of secure reactive systems
In Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 2000, S. Jajodia (ed), pp. 245-254, ACM Press, pp 245-254

D. Alessandri, Using Rule-Base Activity Descriptions to Evaluate Intrusion-Detection Systems
In Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000), Toulouse, October 2000
Lecture Notes in Computer Science 1907, Springer-Verlag, pp. 183-196
Available from http://www.raid-symposium.org/

I.S.Welch and R.J.Stroud, Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
In Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000), Toulouse, France, October 2000
Lecture Notes in Computer Science 1985, Springer-Verlag, pp. 309-323

K. Julisch, Dealing with False Positives in Intrusion Detection (extended abstract)
In Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection (RAID 2000), Toulouse, October 2000
Available from http://www.raid-symposium.org/ [ presentation ] [ abstract ]

P. Veríssimo, N.F. Neves, M. Correia, The Middleware Architecture of MAFTIA: A Blueprint
In Proceedings of the 3rd IEEE Survivability Workshop (ISW), Boston, USA, October 2000
Available from http://www.navigators.di.fc.ul.pt/archive/isw00.pdf

C. Cachin, K. Kursawe, and V. Shoup, Random oracles in Constantinople: practical asynchronous Byzantine agreement using cryptography
In Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing, Portland, Oregon, July 2000
pp 123-132. ACM Press. 2000
Available from http://www.zurich.ibm.com/~cca/papers/abba.pdf

P. Veríssimo, A. Casimiro and C. Fetzer, The Timely Computing Base: Timely Actions in the Presence of Uncertain Timeliness
In Proceedings of the International Conference on Dependable Systems and Networks, New York, USA, June 2000
Available from http://www.navigators.di.fc.ul.pt/archive/dsn00.pdf

B. Pfitzmann and M. Waidner, A model for asynchronous reactive systems and its application to secure message transmission
In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 2000, pp. 184-200
IEEE Computer Society Technical Committee on Security and Privacy, IEEE Computer Society Press

B. Pfitzmann, M. Schunter, and M. Waidner, Cryptographic Security of Reactive Systems
In Proceedings of the Workshop on Secure Architectures and Information Flow, Royal Holloway, University of London, December 1-3, 1999
Electronic Notes in Theoretical Computer Science (ENTCS) 32, 2000
Available from Elsevier Press