Random Post:
RSS .92| RSS 2.0| ATOM 0.3
  • Home
  • #6 (no title)
  •  

    WEST: Wormhole-Enhanced State Transfer

    March 23rd, 2009

    WEST: Wormhole-Enhanced State Transfer
    Rogério Correia, Paulo Sousa
    In Proceedings of the DSN 2009 Workshop on Proactive Failure Avoidance, Recovery and Maintenance (PFARM), Estoril, Portugal, June 2009.


    Enhancing Fault / Intrusion Tolerance through Design and Configuration Diversity

    March 23rd, 2009

    Enhancing Fault / Intrusion Tolerance through Design and Configuration Diversity
    Alysson N. Bessani, Alessandro Daidone, Ilir Gashi, Rafael R. Obelheiro, Paulo Sousa, Vladimir Stankovic
    In Proceedings of the 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2009), Estoril, Portugal, June 2009.


    BFT Services Programming with a Dependable Tuple Space

    March 11th, 2009

    BFT Services Programming with a Dependable Tuple Space
    François Aubry, Alysson Bessani, Paulo Sousa
    In Proceedings of the 39th IEEE International Conference on Dependable Systems and Networks (DSN 2009) – Fast Abstract, Estoril, Portugal, June 2009.


    Transparent Byzantine Fault-Tolerant Directory Service using COTS components

    March 10th, 2009

    Transparent Byzantine Fault-Tolerant Directory Service using COTS components
    Francisco Vieira, Paulo Sousa, Alysson Bessani
    In Proceedings of the 39th IEEE International Conference on Dependable Systems and Networks (DSN 2009) – Fast Abstract, Estoril, Portugal, June 2009.


    DSN 2009 Fast Abstracts

    February 28th, 2009

    DSN 2009: 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 29 – July 2, 2009.

    Summary:

    DSN is the chosen forum for researchers around the world, for presenting the very best research results, solutions to problems, and insight into emergent new challenges. DSN has pioneered the fusion between security and dependability, understanding the need to simultaneously fight against cyber attacks, accidental faults, design errors, and unexpected operating conditions.


    Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned

    January 3rd, 2009

    Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned
    Paulo Veríssimo, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa
    Proceedings of the 42nd Hawaii International Conference for the Systems Sciences (HICSS-42), Waikoloa, Hawaii, January 2009. (best paper nomination)


    FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery

    December 31st, 2008

    FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery
    Alysson Neves Bessani, Hans P. Reiser, Paulo Sousa, Ilir Gashi, Vladimir Stankovic, Tobias Distler, Rüdiger Kapitza, Alessandro Daidone, Rafael R. Obelheiro
    In Middleware (Companion),  Leuven, Belgium, pages 99-101, December 2008.


    The CRUTIAL Way of Critical Infrastructure Protection

    December 31st, 2008

    IEEE Security & Privacy Nov/Dec 2008

    IEEE Security & Privacy Nov/Dec 2008

    The CRUTIAL Way of Critical Infrastructure Protection
    Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo
    IEEE Security and Privacy, vol. 6, no. 6, pp. 44-51, Nov/Dec 2008.


    On the Effects of Diversity on Intrusion Tolerance

    December 30th, 2008

    On the Effects of Diversity on Intrusion Tolerance
    Alysson Neves Bessani, Rafael Obelheiro, Paulo Sousa, Ilir Gashi
    Submitted to publication.
    Available as Technical Report DI/FCUL TR-08-30.


    JBP – Java Byzantine Paxos

    December 18th, 2008

    JBP aims to provide a complete, modular and clear implementation of the Byzantine Paxos agreement protocol in Java programming language. Since there are several variants of this algorithm, we choose to implement Paxos at War, by Piotr Zielinski, for consensus and extended it to for total order multicast adding only one communication step and maintaining the quadratic message complexity using the usual technique proposed by Leslie Lamport in the Classical Paxos algorithm and later extended by Castro and Liskov in the BFT system.

    JBP was developed because there was no implementation of a fast Byzantine fault-tolerant Total order multicast protocol in Java. Moreover, JBP implementation follow the same line of the BFT system (implemented in C), but we want to separate state management (basically, checkpoints) from the core total order multicast algorithm.

    JBP is available to download, you are welcome to try it!