March 28, 2009
INForum 2009 – Computer and Communications Security Track, Sep 10-11, 2009.
Summary (in portuguese):
O INForum tem como objectivo ser um evento privilegiado de reunião da comunidade nacional nas diversas vertentes da informática e ambiciona ser o fórum de eleição para a divulgação, discussão e reconhecimento de trabalhos científicos. O INForum surge com particular oportunidade como palco para a estreia de jovens investigadores que buscam a divulgação, a crítica construtiva e o encorajamento ao seu trabalho.
O 1º INForum pretende ser abrangente e dinâmico no conjunto de tópicos abordados. Apresentará um conjunto de tópicos propostos e seleccionados anualmente, com sessões organizadas e realizadas de forma independente. Promove-se assim a massa crítica para o fortalecimento e evolução da informática no país criando-se, simultaneamente, espaço à evolução do contexto da conferência e fomentando a reunião de investigadores em áreas emergentes.
O 1º INForum decorrerá nos dias 10 e 11 de Setembro de 2009 na Faculdade de Ciências da Universidade de Lisboa.
Leave a Comment » |
Committees, Events, Program | Tagged: attack injection, availability, byzantine fault tolerance, car-to-car communication, critical infrastructure protection, critical infrastructures, dependability, distributed firewall, distributed systems, diversity, exhaustion-safety, fault tolerance, firewall, intrusion tolerance, large scale, mobile computing, proactive recovery, reactive recovery, real-time, resilience, safety criticality, security, self-healing, state machine replication, storage, synchrony, time criticality, virtualization, wormholes |
Permalink
Posted by pjsousa
February 28, 2009
DSN 2009: 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, June 29 – July 2, 2009.
Summary:
DSN is the chosen forum for researchers around the world, for presenting the very best research results, solutions to problems, and insight into emergent new challenges. DSN has pioneered the fusion between security and dependability, understanding the need to simultaneously fight against cyber attacks, accidental faults, design errors, and unexpected operating conditions.
Leave a Comment » |
Committees, Program | Tagged: assumptions, asynchrony, attack injection, byzantine fault tolerance, car-to-car communication, critical infrastructure protection, critical infrastructures, dependability, distributed systems, exhaustion-safety, intrusion tolerance, mobile computing, resilience, security, self-healing, synchrony, virtualization |
Permalink
Posted by pjsousa
September 3, 2008
Intrusion-Resilient Middleware Design and Validation
Paulo Veríssimo, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa
In Annals of Emerging Research in Information Assurance, Security and Privacy Services, H. Raghav Rao and Shambhu Upadhyaya (eds.), Elsevier, to appear. 2008.
Leave a Comment » |
Publications | Tagged: attack injection, availability, byzantine fault tolerance, dependability, distributed systems, intrusion tolerance, resilience, security, self-healing, wormholes |
Permalink
Posted by pjsousa
February 18, 2008
WRAITS 2008: 2nd Workshop on Recent Advances on Intrusion-Tolerant Systems, April 1st, 2008 (in conjunction with the European Conference on Computer Systems – EuroSys 2008).
Summary:
The 2nd Workshop on Recent Advances on Intrusion- Tolerant Systems aims to bring together researchers in the related areas of Intrusion Tolerance, Distributed Trust, Survivability, Byzantine Fault Tolerance, and Resilience. These areas have the purpose of enhancing the Dependability and Security of computer systems by tolerating both malicious faults (attacks, intrusions) and accidental faults. The workshop will be specially interested in “intrusion-tolerant systems”: how to build them? How to evaluate and test their dependability and security? What systems need to be intrusion-tolerant? The workshop will provide a forum for researchers in these areas to present recent results, discuss open problems that still need research, the steps that need to be taken for intrusion-tolerant systems to be deployed in practice, and the target application domains for intrusion tolerance.
Leave a Comment » |
Committees, Program | Tagged: attack injection, availability, byzantine fault tolerance, dependability, distributed systems, intrusion tolerance, resilience, security, virtualization |
Permalink
Posted by pjsousa