Mailicious- and Accidental- Fault Tolerance for Internet Applications (MAFTIA) : Reference Model and Use Cases

  1. Lookup NU author(s)
  2. Emeritus Professor John Dobson
  3. Professor Thomas McCutcheon
  4. Professor Brian Randell
  5. Dr Robert Stroud
  6. Ian Welch
Author(s)Cachin C, Camenisch J, Dacier M, Deswarte Y, Dobson JE, Horne D, Kursawe K, Laprie J-C, Lebraud J-C, Long D, McCutcheon T, Muller J, Petzold F, Pfitzmann B, Powell D, Randell B, Schunter M, Shoup V, VerĂ­ssimo P, Trouessin G, Stroud R, Waidner M, Welch I
Publication type Report
Series TitleDepartment of Computing Science Technical Report Series
Source Publication DateAugust 2000
Report Number707
Full text is available for this publication:
This document constitutes the first deliverable of the MAFTIA work package 1. The objective of this work package is to define a consistent framework for ensuring the dependability of distributed applications in the face of a wide class of threats. In particular, the aim is to develop a coherent set of concepts for an architecture that can tolerate deliberately malicious faults, such as intrusions, in applications distributed over the Internet. The intrusions of concern include not only those perpetrated by external penetrators, but also those carried out by corrupt insiders, i.e., users who are authorized to access the system but not authorized for the accessed data, program or resource, and administrators who misuse their rights. Although intrusions are the primary class of targeted faults, the architecture should also be adequately robust towards accidental physical faults and accidental design faults.
InstitutionDepartment of Computing Science, University of Newcastle upon Tyne
Place PublishedNewcastle upon Tyne
ActionsLink to this publication