December 13th, 2009
SMaRt is a high performance Byzantine-fault-tolerant state machine replication protocol developed in Java with simplicity and robustness as primary requirements. Our main objective is to provide a code base that can be used to build dependable services and also extended to create new protocols.
Check the most recent release at http://code.google.com/p/bft-smart/
No Comments » | Software | Permalink
Posted by pjsousa
December 1st, 2009
14-15th December, 2009
Faculdade de Ciências, Universidade de Lisboa
*see the Academy brochure*
The Carnegie Mellon|Portugal Security and Dependability Academy is an opportunity for professionals of computer science and engineering or related areas, interested in improving their skills, to get in touch with the experts involved in the Dual Carnegie Mellon University – University of Lisboa Master of Science in Information Technology–Information Security (MSIT-IS).
The Academy will provide a sample of the topics taught during the MSIT-IS program through a set of exciting technical lectures and hands-on experiments in the program’s lab, where the attendees will get the chance to try live cyber-attack and defense technologies.
Although inspired by the MSIT-IS, the academy will be interesting on its own as a forum for discussion of the latest concepts in Security and Dependability.
After the lectures and laboratory experiments, the academy will close with the Pen Testing Trophy, where a victim machine will be subject to penetration testing by willing participants competing for a mysterious trophy.
Check the Program, Lectures details, Instructors, etc.
No Comments » | Events | Permalink
Posted by pjsousa
November 19th, 2009
IBWAS’09: Iberic Web Application Security, Dec 10-11, 2009.
Summary:
There is a change in the information systems development paradigm. The emergence of Web 2.0 technologies led to the extensive deployment and use of web-based applications and web services as a way to developed new and flexible information systems. Such systems are easy to develop, deploy and maintain and demonstrate impressive features for users, resulting in their current wide use.
As a result of this paradigm shift, the security requirements have also changed. These web-based information systems have different security requirements, when compared to traditional systems. Important security issues have been found and privacy concerns have also been raised recently. In addition, the emerging Cloud Computing paradigm promises even greater flexibility; however corresponding security and privacy issues still need to be examined. The security environment should involve not only the surrounding environment but also the application core.
This conference aims to bring together application security experts, researchers, educators and practitioners from the industry, academia and international communities such as OWASP, in order to discuss open problems and new solutions in application security. In the context of this track academic researchers will be able to combine interesting results with the experience of practitioners and software engineers.
No Comments » | Committees, Events, Program | Permalink
Posted by pjsousa
April 7th, 2009
Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection
Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, Fábio Souto, Miguel Correia, Nuno F. Neves
In Proceedings of the 39th IEEE International Conference on Dependable Systems and Networks (DSN 2009), Estoril, Portugal, Jun-Jul 2009, to appear.
No Comments » | Publications | Permalink
Posted by pjsousa