Intrusion-tolerant middleware

Paulo E. Veríssimo, Nuno F. Neves, Christian Cachin, Jonathan Poritz, David Powell, Yves Deswarte, Robert Stroud, Ian Welch

Research output: Contribution to journalArticlepeer-review

65 Scopus citations

Abstract

The advances made on the intrusion-tolerant middleware, developed by the Malicious-and Accidental-Fault Tolerance for Internet Applications (MAFTIA), for tolerating both accidental faults and malicious attacks in complex systems are discussed. The MAFTIA architecture selectively uses intrusion-tolerance mechanisms to build layers of progressively more trusted components and middleware subsystems from baseline untrusted components. Its three dimensions, hardware, local support, and distributed software, help applications operate securely across several hosts, even in the presence of malicious faults. MAFTIA supplies different solutions for different levels of threats and criticality, keeping the best possible performance-resilience trade-off. MAFTIA assumes a fairly severe fault model, assuming that hosts and the communication environment are asynchronous. The architecture is related to the algorithmic suites that implement communication and agreement among processes in different hosts.
Original languageEnglish (US)
Pages (from-to)54-62
Number of pages9
JournalIEEE Security and Privacy
Volume4
Issue number4
DOIs
StatePublished - Jul 1 2006
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2021-03-16

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Law
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Intrusion-tolerant middleware'. Together they form a unique fingerprint.

Cite this