Malicious-and Accidental-Fault Tolerance for Internet Applications
IST Research Project IST-1999-11583
1 January 2000 - 28 February 2003

Check out a summary of the project, or browse through the original project proposal.

MAFTIA involved experts from 5 countries and 6 organisations. The Industrial Advisory Board provided valuable feedback on the work of the project.

Research was organised into six workpackages.

Find out more about the key scientific results and achievements, and the benefits of this research collaboration.




Final Workshop
Held at Newcastle University, 18-19 February, 2003.



Deliverables
All the MAFTIA deliverables in one place.



Publications
A list of MAFTIA-related papers published by members of the project.



http://www.research.ec.org/dsos/index.html

http://www.research.ec.org/cabernet/

http://www.tolerantsystems.org/

Publications

These publications, authored by MAFTIA members, are related to MAFTIA and were published during the project.

Publications are sorted by type and listed by year.

Intrusion Tolerance

There is a significant body of research on distributed computing architectures, methodologies and algorithms, both in the fields of fault tolerance and security. Whilst they have taken separate paths until recently, the problems to be solved are of similar nature. In classical dependability, fault tolerance has been the workhorse of many solutions. Classical security-related work has on the other hand privileged, with few exceptions, intrusion prevention. Intusion tolerance

Intrusion tolerance is a new approach that has slowly emerged during the past decade, and gained impressive momentum recently. Instead of trying to prevent every single intrusion, these are allowed, but tolerated: the system triggers mechanisms that prevent the intrusion from generating a system security failure. The tolerance paradigm in security has deserved great attention recently. MAFTIA developed concepts and prototyped architectures; in the USA, the OASIS program, implemented several intrusion-tolerant systems.

With the aim of disseminating intrusion tolerance concepts and techniques to a wide audience, a tutorial [ abstract ] [ pdf ], and a companion text [ abstract ] [ pdf ] were prepared. The tutorial has been presented at several conferences and universities.