Malicious-and Accidental-Fault Tolerance for Internet Applications
IST Research Project IST-1999-11583
1 January 2000 - 28 February 2003

Check out a summary of the project, or browse through the original project proposal.

MAFTIA involved experts from 5 countries and 6 organisations. The Industrial Advisory Board provided valuable feedback on the work of the project.

Research was organised into six workpackages.

Find out more about the key scientific results and achievements, and the benefits of this research collaboration.




Final Workshop
Held at Newcastle University, 18-19 February, 2003.



Deliverables
All the MAFTIA deliverables in one place.



Publications
A list of MAFTIA-related papers published by members of the project.



http://www.research.ec.org/dsos/index.html

http://www.research.ec.org/cabernet/

http://www.tolerantsystems.org/

Publications - Technical Reports

These technical reports were published about MAFTIA-related topics The listing is ordered by year.

2003

Veríssimo, P. Neves, N.F., and Correia,M., Intrusion-Tolerant Architectures: Concepts and Design (extended)
Technical Report DI/FCUL TR03-5, Department of Computer Science, University of Lisboa, 2003
Available from http://www.di.fc.ul.pt/

2002

Veríssimo, P., Intrusion Tolerance: Concepts and Design Principles. A Tutorial
Technical Report DI/FCUL TR02-6, Department of Computer Science, University of Lisboa, 2002
Available from http://www.di.fc.ul.pt/

A.-R. Sadeghi and M. Steiner, Assumptions related to Discrete Logarithims: Why subtleties make a real difference
CryptEAr 2002/126, 2002
Available from iacr.org in [ pdf ] [ ps.gz ] format

2001

K. Kursawe and V. Shoup, Optimistic asynchronous atomic broadcast
Report 2001/022, Cryptology ePrint Archive, March 2001

Correia,M., Veríssimo, P. and Neves,N.F., The Design of a COTS Real-Time Distributed Security Kernel (Extended Version)
DI/FCUL TR 01-12, Department of Computer Science, University of Lisboa, December 2001

2000

B. Pfitzmann and M. Waidner, A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
IBM Research Report RZ 3304 (#93350) 12/11/2000, IBM Research Division, Zurich, December 2000
Available from http://eprint.iacr.org/2000/066.ps.gz

B. Pfitzmann and M. Waidner, Composition and Integrity Preservation of Secure Reactive Systems
IBM Research Report RZ 3234 (#93280) 06/12/00, IBM Research Division, Zürich, June 2000; accepted for 7th ACM Conference on Computer and Communications Security, Athens, November 2000
Available from http://www.semper.org

B. Pfitzmann, M. Schunter and M. Waidner, Provably Secure Certified Mail
IBM Research Report RZ 3207 (#93253), 02/14/00, IBM Research Division, Zurich, August 2000
Available from http://www.semper.org

B. Pfitzmann, M. Schunter and M. Waidner, Secure Reactive Systems
IBM Research Report RZ 3206 (#93252) 02/14/00, IBM Research Division, Zurich, May 2000
Available from http://www.semper.org

P. Veríssimo, N. F. Neves and M. Correia, The middleware architecture of MAFTIA: A Blueprint (extended)
Technical Report DI/FCUL TR 00-6. September 2000

I. Welch and R.J. Stroud, Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Department of Computing Science, University of Newcastle, CS-TR: 705, 2000
Available from http://www.cs.ncl.ac.uk/ [ Abstract ] [ pdf ] [ ps ]

I. Welch and R.J. Stroud, Kava - Using Byte code Rewriting to add Behavioural Reflection in Java
Department of Computing Science, University of Newcastle,CS-TR: 704 2000
Available from http://www.cs.ncl.ac.uk/ [ Abstract ] [ pdf ] [ ps ]