Malicious-and Accidental-Fault Tolerance for Internet Applications
IST Research Project IST-1999-11583
1 January 2000 - 28 February 2003

Check out a summary of the project, or browse through the original project proposal.

MAFTIA involved experts from 5 countries and 6 organisations. The Industrial Advisory Board provided valuable feedback on the work of the project.

Research was organised into six workpackages.

Find out more about the key scientific results and achievements, and the benefits of this research collaboration.




Final Workshop
Held at Newcastle University, 18-19 February, 2003.



Deliverables
All the MAFTIA deliverables in one place.



Publications
A list of MAFTIA-related papers published by members of the project.



http://www.research.ec.org/dsos/index.html

http://www.research.ec.org/cabernet/

http://www.tolerantsystems.org/

Publications - Other Types

These publications, authored by MAFTIA members, are related to MAFTIA and were published during the project.

Journal Articles

Ian Welch and Robert J. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code, Journal of Computer Security, Vol: 10
IOS Press, Netherlands, pp 399-432, 2002

Ian Welch and Robert Stroud, Re-engineering Security as a Crosscutting Concern - Experience with a Third Party Application,
to appear in the special edition of the British Computing Society Journal on Aspect Oriented Programming and Separation of Concerns

Conference Proceedings

EuroCrypt 2001, Pfitzmann, B. (ed),
Lecture Notes in Computer Science, Vol: 2045, Springer Verlag, 2001
Available from http://link.springer.de/link/service/series/0558/tocs/t2045.htm

Book Chapter

K. Julisch, Data Mining for Intrusion Detection - A Critical Review, in Applications of Data Mining in Computer Security, D. Barbera and S. Jajodia (eds.)
Kluwer Academic Publishers, Boston, 2002

Welch, I. and Stroud, R. J., Kava - A Reflective Java Based on Bytecode Rewriting, in Reflection and Software Engineering, Cazzola, Walter and Stroud, Robert J. and Tisato, Francesco (eds), Vol: 1826
Springer-Verlag, pp 157-169, 2000

Theses

Schunter, M., Optimistic Fair Exchange, Technische Fakultat der Universitat des Saarlandes, Saarbrucken, October 2002
Available from http://www.semper.org in [ pdf ] [ ps.gz ] format

Steiner, M., Secure Group Key Agreement, Naturwissenschaftlich-Technische Fakultat der Universitat des Saarlandes, Saarbrucken, March 2002
Available from http://www.semper.org

Welch, I., Implementing Reflective Security Architectures for Applications, Department of Computing Science, University of Newcastle upon Tyne, 2002

Miscellaneous

Kursawe, K. and Shoup, V., Optimistic Asynchronous Atomic Broadcast, Cryptology ePrint Archive, Report 2001/022, 2001
Available from http://eprint.iacr.org/2001/022/

Veríssimo, P., Neves, N.F. and Correia,M., Intrusion-Tolerant Architectures: Concepts and Design
In Architecting Dependable Systems, R. Lemos, C. Gacek, A. Romanovsky (eds.), Lecture Notes in Computer Science, Vol: 2677, Springer Verlag, 2003

Veríssimo, P., Uncertainty and Predictability: Can they be reconciled?
In Future Directions in Distributed Computing, Lecture Notes in Computer Science, Vol: 2584, Springer-Verlag, 2003
Available from http://www.navigators.di.fc.ul.pt/