MAFTIA: Reference Model and Use Cases
Autor(a) principal: | |
---|---|
Data de Publicação: | 2000 |
Outros Autores: | , , , , , , , , , , , , , , , , , , , , |
Tipo de documento: | Relatório |
Idioma: | por |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | http://hdl.handle.net/10451/14223 |
Resumo: | This document constitutes the first deliverable of MAFTIA work package 1. The objective of this work package is to define a consistent framework for ensuring the dependability of distributed applications in the face of a wide class of threats. In particular, the aim is to develop a coherent set of concepts for an architecture that can tolerate deliberately malicious faults, such as intrusions, in applications distributed over the Internet. The intrusions of concern include not only those perpetrated by external penetrators, but also those carried out by corrupt insiders, i.e., users who are authorized to access the system but not authorized for the accessed data, program or resource, and administrators who misuse their rights. Although intrusions are the primary class of targeted faults, the architecture should also be adequately robust towards accidental physical faults and accidental design faults |
id |
RCAP_132253ed0f7b2e48d1e2bf5257a51cdc |
---|---|
oai_identifier_str |
oai:repositorio.ul.pt:10451/14223 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
MAFTIA: Reference Model and Use CasesThis document constitutes the first deliverable of MAFTIA work package 1. The objective of this work package is to define a consistent framework for ensuring the dependability of distributed applications in the face of a wide class of threats. In particular, the aim is to develop a coherent set of concepts for an architecture that can tolerate deliberately malicious faults, such as intrusions, in applications distributed over the Internet. The intrusions of concern include not only those perpetrated by external penetrators, but also those carried out by corrupt insiders, i.e., users who are authorized to access the system but not authorized for the accessed data, program or resource, and administrators who misuse their rights. Although intrusions are the primary class of targeted faults, the architecture should also be adequately robust towards accidental physical faults and accidental design faultsDepartment of Informatics, University of LisbonRepositório da Universidade de LisboaCachin, C.Camenisch, J.Deswarte, Y.Dobson, J.Horne, D.Kursawe, K.Laprie, J.-C.Lebraud, J.-C.Long, D.McCutcheon, T.Muller, J.Petzold, F.Pfitzmann, B.Powell, DavidRandell, B.Schunter, M.Shoup, V.Veríssimo, PauloTrouessin, G.Stroud, Robert J.Waidner, M.Welch, I. S.2009-02-10T13:11:42Z2000-082000-08-01T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/reportapplication/pdfhttp://hdl.handle.net/10451/14223porinfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-11-08T15:59:54Zoai:repositorio.ul.pt:10451/14223Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T21:36:02.998798Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
MAFTIA: Reference Model and Use Cases |
title |
MAFTIA: Reference Model and Use Cases |
spellingShingle |
MAFTIA: Reference Model and Use Cases Cachin, C. |
title_short |
MAFTIA: Reference Model and Use Cases |
title_full |
MAFTIA: Reference Model and Use Cases |
title_fullStr |
MAFTIA: Reference Model and Use Cases |
title_full_unstemmed |
MAFTIA: Reference Model and Use Cases |
title_sort |
MAFTIA: Reference Model and Use Cases |
author |
Cachin, C. |
author_facet |
Cachin, C. Camenisch, J. Deswarte, Y. Dobson, J. Horne, D. Kursawe, K. Laprie, J.-C. Lebraud, J.-C. Long, D. McCutcheon, T. Muller, J. Petzold, F. Pfitzmann, B. Powell, David Randell, B. Schunter, M. Shoup, V. Veríssimo, Paulo Trouessin, G. Stroud, Robert J. Waidner, M. Welch, I. S. |
author_role |
author |
author2 |
Camenisch, J. Deswarte, Y. Dobson, J. Horne, D. Kursawe, K. Laprie, J.-C. Lebraud, J.-C. Long, D. McCutcheon, T. Muller, J. Petzold, F. Pfitzmann, B. Powell, David Randell, B. Schunter, M. Shoup, V. Veríssimo, Paulo Trouessin, G. Stroud, Robert J. Waidner, M. Welch, I. S. |
author2_role |
author author author author author author author author author author author author author author author author author author author author author |
dc.contributor.none.fl_str_mv |
Repositório da Universidade de Lisboa |
dc.contributor.author.fl_str_mv |
Cachin, C. Camenisch, J. Deswarte, Y. Dobson, J. Horne, D. Kursawe, K. Laprie, J.-C. Lebraud, J.-C. Long, D. McCutcheon, T. Muller, J. Petzold, F. Pfitzmann, B. Powell, David Randell, B. Schunter, M. Shoup, V. Veríssimo, Paulo Trouessin, G. Stroud, Robert J. Waidner, M. Welch, I. S. |
description |
This document constitutes the first deliverable of MAFTIA work package 1. The objective of this work package is to define a consistent framework for ensuring the dependability of distributed applications in the face of a wide class of threats. In particular, the aim is to develop a coherent set of concepts for an architecture that can tolerate deliberately malicious faults, such as intrusions, in applications distributed over the Internet. The intrusions of concern include not only those perpetrated by external penetrators, but also those carried out by corrupt insiders, i.e., users who are authorized to access the system but not authorized for the accessed data, program or resource, and administrators who misuse their rights. Although intrusions are the primary class of targeted faults, the architecture should also be adequately robust towards accidental physical faults and accidental design faults |
publishDate |
2000 |
dc.date.none.fl_str_mv |
2000-08 2000-08-01T00:00:00Z 2009-02-10T13:11:42Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/report |
format |
report |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10451/14223 |
url |
http://hdl.handle.net/10451/14223 |
dc.language.iso.fl_str_mv |
por |
language |
por |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Department of Informatics, University of Lisbon |
publisher.none.fl_str_mv |
Department of Informatics, University of Lisbon |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799134259344048128 |