Random Post: Fall 2009
RSS .92| RSS 2.0| ATOM 0.3
  • Home
  • #6 (no title)
  •  

    EDCC-7 Student Forum

    March 19th, 2008

    EDCC-7: 7th European Dependable Computing Conference, May 7-9, 2008.

    Summary:

    There is an increasing dependency of the society on computing services and their underlying computing systems. This dependency creates strict requirements for the delivered services. These requirements affect to the quality of service, continuous availability, survivability in the advent of catastrophic failures, confidentiality, intrusion tolerance, etc. Dependability is a concept that considers all these cross-cutting concerns and required attributes, such as reliability, availability, safety, and security, as well as human factors.

    The 7th European Dependable Computing Conference aims at providing a European-hosted venue for researchers and practioners from all over the world to present and discuss their latest research achievements. Original papers are solicited on theory, techniques, systems, and tools for the design, validation, operation and evaluation of dependable computing systems. All kinds of faults are of interest, from traditional hardware and software faults to accidental and malicious human interactions.


    WRAITS 2008

    February 18th, 2008

    WRAITS 2008: 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems, April 1st, 2008 (in conjunction with the European Conference on Computer Systems – EuroSys 2008).

    Summary:

    The 2nd Workshop on Recent Advances on Intrusion- Tolerant Systems aims to bring together researchers in the related areas of Intrusion Tolerance, Distributed Trust, Survivability, Byzantine Fault Tolerance, and Resilience. These areas have the purpose of enhancing the Dependability and Security of computer systems by tolerating both malicious faults (attacks, intrusions) and accidental faults. The workshop will be specially interested in “intrusion-tolerant systems”: how to build them? How to evaluate and test their dependability and security? What systems need to be intrusion-tolerant? The workshop will provide a forum for researchers in these areas to present recent results, discuss open problems that still need research, the steps that need to be taken for intrusion-tolerant systems to be deployed in practice, and the target application domains for intrusion tolerance.


    Hidden Problems of Asynchronous Proactive Recovery

    June 30th, 2007

    Hidden Problems of Asynchronous Proactive Recovery
    [paper]
    Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo
    In the Third Workshop on Hot Topics in System Dependability (HotDep’07). Edinburgh, UK, June 2007.


    Proactive Resilience

    May 25th, 2007

    Proactive Resilience
    [thesis]
    Paulo Sousa
    Ph.D. thesis, May 2007.


    Ph.D. (2004-2007)

    May 25th, 2007

    From 2004 until 2007, I’ve worked on my PhD thesis. The main goal was to design a system architecture in which protocols could tolerate, through proactive resilience, any number of arbitrary faults over the lifetime of a system.

    The initial PhD work plan is described here. Also available as a presentation.


    Resilient State Machine Replication

    December 20th, 2005

    Resilient State Machine Replication
    [paper | slides with animations | slides without animations]
    Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo
    In Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing (PRDC), Changsha, China, pages 305-309, December 2005.


    How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?

    June 30th, 2005

    How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?
    [paper | slides with animations | slides without animations]
    Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo
    In Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN’05). Yokohama, Japan, pages 98-107, June 2005.