Malicious-and Accidental-Fault Tolerance for Internet Applications
IST Research Project IST-1999-11583
1 January 2000 - 28 February 2003

Check out a summary of the project, or browse through the original project proposal.

MAFTIA involved experts from 5 countries and 6 organisations. The Industrial Advisory Board provided valuable feedback on the work of the project.

Research was organised into six workpackages.

Find out more about the key scientific results and achievements, and the benefits of this research collaboration.

Final Workshop
Held at Newcastle University, 18-19 February, 2003.

All the MAFTIA deliverables in one place.

A list of MAFTIA-related papers published by members of the project.

Publications - Other Types

These publications, authored by MAFTIA members, are related to MAFTIA and were published during the project.

Journal Articles

Ian Welch and Robert J. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code, Journal of Computer Security, Vol: 10
IOS Press, Netherlands, pp 399-432, 2002

Ian Welch and Robert Stroud, Re-engineering Security as a Crosscutting Concern - Experience with a Third Party Application,
to appear in the special edition of the British Computing Society Journal on Aspect Oriented Programming and Separation of Concerns

Conference Proceedings

EuroCrypt 2001, Pfitzmann, B. (ed),
Lecture Notes in Computer Science, Vol: 2045, Springer Verlag, 2001
Available from

Book Chapter

K. Julisch, Data Mining for Intrusion Detection - A Critical Review, in Applications of Data Mining in Computer Security, D. Barbera and S. Jajodia (eds.)
Kluwer Academic Publishers, Boston, 2002

Welch, I. and Stroud, R. J., Kava - A Reflective Java Based on Bytecode Rewriting, in Reflection and Software Engineering, Cazzola, Walter and Stroud, Robert J. and Tisato, Francesco (eds), Vol: 1826
Springer-Verlag, pp 157-169, 2000


Schunter, M., Optimistic Fair Exchange, Technische Fakultat der Universitat des Saarlandes, Saarbrucken, October 2002
Available from in [ pdf ] [ ps.gz ] format

Steiner, M., Secure Group Key Agreement, Naturwissenschaftlich-Technische Fakultat der Universitat des Saarlandes, Saarbrucken, March 2002
Available from

Welch, I., Implementing Reflective Security Architectures for Applications, Department of Computing Science, University of Newcastle upon Tyne, 2002


Kursawe, K. and Shoup, V., Optimistic Asynchronous Atomic Broadcast, Cryptology ePrint Archive, Report 2001/022, 2001
Available from

Veríssimo, P., Neves, N.F. and Correia,M., Intrusion-Tolerant Architectures: Concepts and Design
In Architecting Dependable Systems, R. Lemos, C. Gacek, A. Romanovsky (eds.), Lecture Notes in Computer Science, Vol: 2677, Springer Verlag, 2003

Veríssimo, P., Uncertainty and Predictability: Can they be reconciled?
In Future Directions in Distributed Computing, Lecture Notes in Computer Science, Vol: 2584, Springer-Verlag, 2003
Available from