1. Fraga J S, Powell D. A fault and intrusion-tolerant file system. Proceedings of the 3rd International Conference on Computer Security (IFIP/SEC'85), Aug 12-15, 1985, Dublin, Ireland. Amsterdam, The Netherlands: Elsevier Science, 1985: 203-218
2. Correia M, Neves N F, Lung L C. Byzantine-resistant consensus based on a novel approach to intrusion tolerance. Proceedings of the 10th Pacific Rim International Symposium on Dependable Computing (PRDC’04), Mar 3-5, 2004, Tahiti, French Polynesia. Piscataway, NJ, USA: IEEE, 2004
3. Moniz H, Neves N F, Correia M. Randomized intrusion-tolerant asynchronous services. Proceedings of the International Conference on Dependable Systems and Networks (DSN’06), Jun 25-28, 2006, Philadelphia, PA, USA. New York, NY, USA: ACM, 2006: 568-577
4. Reiter M K. A secure group membership protocol. IEEE Transactions on Software Engineering, 1996, 22(1): 31-42
5. Correia M, Neves N F, Veríssimo P. How to tolerate half less one Byzantine nodes in practical distributed systems. Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems (SRDS’04), Oct 2-4, 2004, Florianopolis, Brazil. Piscataway, NJ, USA: IEEE, 2004: 174-183
6. Lung L C, Correia M, Neves N F. A simple intrusion-tolerant reliable multicast protocol using the TTCB. 21 Simpósio Brasileiro de Redes de Computadores (SBRC2003), Natal, Brazil. 2003: 649-663
7. Clement A, Marchetti M, Wong E, et al. Making Byzantine fault tolerant systems tolerate Byzantine faults. UTCS-TR-08-27. Austin, TX, USA: University of Texas at Austin, 2008
8. Correia M, Veríssimo P, Neves N F. The design of a COTS real-time distributed security kernel. Proceedings of the 4th European Dependable Computing Conference (EDDC’02), Oct 23-25, 2002, Toulouse, France. Berlin, Germany: Springer-Verlag, 2002: 234-252
9. Verìssimo P, Casimiro A. The timely computing base model and architecture. IEEE Transactions on Computers, 2002, 51(8): 916-930
10. Correia M, Neves N F, Lung L C, et al. Worm-IT—a wormhole-based intrusion-tolerant group communication system. Journal of Systems and Software, 2007, 80(2): 178-197
11. Sousa P, Neves N F, Verìssimo P. Resilient state machine replication. DI/FCUL TR-05-17. Lisbon, Portugal: University of Lisbon, 2005
12. Gupta V, Lam V, Ramasamy H V, et al. Dependability and performance evaluation of intrusion-tolerant server architectures. Proceedings of the 1st Latin-American Symposium on Dependable Computing (LADC’03), Oct 21-24, 2003, Sao Paulo, Brazil. LNCS 2847. Berlin, Germay: Springer-Verlag, 2003: 81-101 |