Miguel Correia

Orcid: 0000-0001-7873-5531

Affiliations:
  • University of Lisbon, Instituto Superior Técnico, Portugal


According to our database1, Miguel Correia authored at least 193 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Brief History of Blockchain Interoperability.
Commun. ACM, October, 2024

Hephaestus: Modeling, Analysis, and Performance Evaluation of Cross-Chain Transactions.
IEEE Trans. Reliab., June, 2024

BUNGEE: Dependable Blockchain Views for Interoperability.
Distributed Ledger Technol. Res. Pract., March, 2024

Peregrine: ML-based Malicious Traffic Detection for Terabit Networks.
CoRR, 2024

Blockchain-based Rental Documentation Management with Audit Support.
CoRR, 2024

Blockchain Based Residential Smart Rent.
CoRR, 2024

XAI for Skin Cancer Detection with Prototypes and Non-Expert Supervision.
CoRR, 2024

SoK: Security and Privacy of Blockchain Interoperability.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

An Enterprise Architecture Approach to Semantic Blockchain Interoperability.
Proceedings of the 26th International Conference on Enterprise Information Systems, 2024

Multi-Party Cross-Chain Asset Transfers.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

Benchmarking Blockchain Bridge Aggregators.
Proceedings of the IEEE International Conference on Blockchain, 2024

2023
Monintainer: An orchestration-independent extensible container-based monitoring solution for large clusters.
J. Syst. Archit., December, 2023

MultiTLS: using multiple and diverse ciphers for stronger secure channels.
Comput. Secur., September, 2023

Sanare: Pluggable Intrusion Recovery for Web Applications.
IEEE Trans. Dependable Secur. Comput., 2023

MIRES: Intrusion Recovery for Applications Based on Backend-As-a-Service.
IEEE Trans. Cloud Comput., 2023

Do You Need a Distributed Ledger Technology Interoperability Solution?
Distributed Ledger Technol. Res. Pract., 2023

Vivisecting the Dissection: On the Role of Trusted Components in BFT Protocols.
CoRR, 2023

Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version).
CoRR, 2023

Synthesis of Fault-Tolerant Reliable Broadcast Algorithms With Reinforcement Learning.
IEEE Access, 2023

μVerum: Intrusion Recovery for Microservice Applications.
IEEE Access, 2023

TrustGlass: Human-Computer Trusted Paths with Augmented Reality Smart Glasses.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Poster: In-Network ML Feature Computation for Malicious Traffic Detection.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Deduplication vs Privacy Tradeoffs in Cloud Storage.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

I Can't Escape Myself: Cloud Inter-Processor Attestation and Sealing using Intel SGX.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023

Global and Local Explanations for Skin Cancer Diagnosis Using Prototypes.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023 Workshops, 2023

CBDC Bridging between Hyperledger Fabric and Permissioned EVM-based Blockchains.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

Decentralised Autonomous Organisations for Public Procurement.
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 2023

Automatic Generation of Distributed Algorithms with Generative AI.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages.
IEEE Trans. Reliab., 2022

Omega: A Secure Event Ordering Service for the Edge.
IEEE Trans. Dependable Secur. Comput., 2022

Hermes: Fault-tolerant middleware for blockchain interoperability.
Future Gener. Comput. Syst., 2022

A Survey on Blockchain Interoperability: Past, Present, and Future Trends.
ACM Comput. Surv., 2022

Learning to generate Reliable Broadcast Algorithms.
CoRR, 2022

A survey on business process view integration: past, present and future applications to blockchain.
Bus. Process. Manag. J., 2022

SRX-Secure Data Backup and Recovery for SGX Applications.
IEEE Access, 2022

Anonymous Trusted Data Relocation for TEEs.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

FingerCI: generating specifications for critical infrastructures.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

ComSEC: Secure Communications for Baggage Handling Systems.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
Secure cloud-of-clouds storage with space-efficient secret sharing.
J. Inf. Secur. Appl., 2021

Virtual Static Security Analyzer for Web Applications.
Proceedings of the 20th IEEE International Conference on Trust, 2021

CyberVTI: Cyber Visualization Tool for Intrusion Detection.
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021

Enabling Cross-Jurisdiction Digital Asset Transfer.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
Fireplug: Efficient and Robust Geo-Replication of Graph Databases.
IEEE Trans. Parallel Distributed Syst., 2020

MultiTLS: Secure communication channels with cipher suite diversity.
IACR Cryptol. ePrint Arch., 2020

Decentralized Business Process Control using Blockchain An experience report from two applications: Food Supply Chain and Car Registration.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2020

A Survey on Business Process View Integration.
CoRR, 2020

C2BID: Cluster Change-Based Intrusion Detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

SSIBAC: Self-Sovereign Identity Based Access Control.
Proceedings of the 19th IEEE International Conference on Trust, 2020

P2CSTORE: P2P and Cloud File Storage for Blockchain Applications.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Recoverable Token: Recovering from Intrusions against Digital Assets in Ethereum.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Towards Quantum-Enhanced Machine Learning for Network Intrusion Detection.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

CryingJackpot: Network Flows and Performance Counters against Cryptojacking.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Cryptojacking Detection with CPU Usage Metrics.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

MERLIN: Multi-Language Web Vulnerability Detection.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDS.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

MIRES: Recovering Mobile Applications based on Backend-as-a-Service from Cyber Attacks.
Proceedings of the MobiQuitous '20: Computing, 2020

Multi-Language Web Vulnerability Detection.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Poster: Speeding Up Network Intrusion Detection.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

Towards Secure, Decentralized, and Automatic Audits With Blockchain.
Proceedings of the 28th European Conference on Information Systems, 2020

Blockchain Ecosystem for Verifiable Qualifications.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

2019
SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS.
IEEE Trans. Reliab., 2019

An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios.
Computing, 2019

Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC.
Proceedings of the 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2019

JusticeChain: Using Blockchain to Protect Justice Logs.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Conferences, 2019

OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms.
Proceedings of the Network and System Security - 13th International Conference, 2019

Pando: Personal Volunteer Computing in Browsers.
Proceedings of the 20th International Middleware Conference, 2019

BlockSim: Blockchain Simulator.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
REPSYS: A Robust and Distributed Incentive Scheme for Collaborative Caching and Dissemination in Content-Centric Cellular-Based Vehicular Delay-Tolerant Networks.
IEEE Wirel. Commun., 2018

ePRIVO: An Enhanced PRIvacy-preserVing Opportunistic Routing Protocol for Vehicular Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2018

Benchmarking Static Analysis Tools for Web Security.
IEEE Trans. Reliab., 2018

Pando: a Volunteer Computing Platform for the Web.
CoRR, 2018

FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows.
Proceedings of the 17th IEEE International Conference On Trust, 2018

S-Audit: Efficient Data Integrity Verification for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Introspection for ARM TrustZone with the ITZ Library.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

RockFS: Cloud-backed File System Resilience to Client-Side Attacks.
Proceedings of the 19th International Middleware Conference, 2018

Koordinator: A Service Approach for Replicating Docker Containers in Kubernetes.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Storing Critical Data in the Cloud: Challenges and Solutions.
Proceedings of the 13th International Conference on Software Technologies, 2018

Fireplug: Flexible and robust N-version geo-replication of graph databases.
Proceedings of the 2018 International Conference on Information Networking, 2018

Securing Electronic Health Records in the Cloud.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018

2017
State machine replication in containers managed by Kubernetes.
J. Syst. Archit., 2017

On the Design of Resilient Multicloud MapReduce.
IEEE Cloud Comput., 2017

TruApp: A TrustZone-based authenticity detection service for mobile apps.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

DroidPosture: A trusted posture assessment service for mobile devices.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

T2Droid: A TrustZone-Based Dynamic Analyser for Android Applications.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Xor-Overlay Topology Management beyond Kademlia.
Proceedings of the 11th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2017

Vulnerability-Tolerant Transport Layer Security.
Proceedings of the 21st International Conference on Principles of Distributed Systems, 2017

PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Rectify: black-box intrusion recovery in PaaS clouds.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection.
Proceedings of the Advances in Computational Intelligence, 2017

On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study.
Proceedings of the 13th European Dependable Computing Conference, 2017

Demonstrating a Tool for Injection Attack Prevention in MySQL.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining.
IEEE Trans. Reliab., 2016

JITeR: Just-in-time application-layer routing.
Comput. Networks, 2016

Fingerprinting for Web Applications: From Devices to Related Groups.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Leveraging an homomorphic encryption library to implement a coordination service.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

MACHETE: Multi-path communication for security.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

NoSQL Undo: Recovering NoSQL databases by undoing operations.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

vtTLS: A vulnerability-tolerant communication protocol.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

Feature set tuning in statistical learning network intrusion detection.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

DARSHANA: Detecting route hijacking for communication confidentiality.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

Light-SPD: a platform to prototype secure mobile applications.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

DEKANT: a static analysis tool that learns to detect web application vulnerabilities.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Hacking the DBMS to Prevent Injection Attacks.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Medusa: An Efficient Cloud Fault-Tolerant MapReduce.
Proceedings of the IEEE/ACM 16th International Symposium on Cluster, 2016

Priority-Based State Machine Replication with PRaxos.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage.
SIGMETRICS Perform. Evaluation Rev., 2015

A multi-objective routing algorithm for Wireless Multimedia Sensor Networks.
Appl. Soft Comput., 2015

Betweenness centrality in Delay Tolerant Networks: A survey.
Ad Hoc Networks, 2015

Big Data Analytics for Detecting Host Misbehavior in Large Logs.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Shuttle: Intrusion Recovery for PaaS.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Greft: Arbitrary Fault-Tolerant Distributed Graph Processing.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
Cloud Computing Dependability: Report and Extended Papers of the Second International Workshop on Dependability Issues in Cloud Computing.
ACM SIGOPS Oper. Syst. Rev., 2014

MITRA: byzantine fault-tolerant middleware for transaction processing on replicated databases.
SIGMOD Rec., 2014

Automatic detection and correction of web application vulnerabilities using data mining to predict false positives.
Proceedings of the 23rd International World Wide Web Conference, 2014

SCFS: A Shared Cloud-backed File System.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Non-blocking Atomic Commitment with Byzantine Faults.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

2013
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds.
ACM Trans. Storage, 2013

Byzantine Fault-Tolerant Consensus in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2013

On the Performance of Byzantine Fault-Tolerant MapReduce.
IEEE Trans. Dependable Secur. Comput., 2013

Efficient Byzantine Fault-Tolerance.
IEEE Trans. Computers, 2013

Dependability issues in cloud computing: extended papers from the 1st international workshop on dependability issues in cloud computing - DISCCO.
ACM SIGOPS Oper. Syst. Rev., 2013

BFT-TO: Intrusion Tolerance with Less Replicas.
Comput. J., 2013

On the Efficiency of Durable State Machine Replication.
Proceedings of the 2013 USENIX Annual Technical Conference, 2013

Byzantine fault-tolerant state machine replication with twin virtual machines.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Securing energy metering software with automatic source code correction.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

Selfish and malicious behavior in Delay-Tolerant Networks.
Proceedings of the 2013 Future Network & Mobile Summit, Lisboa, Portugal, July 3-5, 2013, 2013

Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud.
Proceedings of the Euro-Par 2013: Parallel Processing Workshops, 2013

2012
Vers une plate-forme MapReduce tolérant les fautes byzantines.
Tech. Sci. Informatiques, 2012

Practical Hardening of Crash-Tolerant Systems.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

2011
RITAS: Services for Randomized Intrusion Tolerance.
IEEE Trans. Dependable Secur. Comput., 2011

Byzantine consensus in asynchronous message-passing systems: a survey.
Int. J. Crit. Comput. Based Syst., 2011

Randomization can be a healer: consensus with dynamic omission failures.
Distributed Comput., 2011

The Final Frontier: Confidentiality and Privacy in the Cloud.
Computer, 2011

N-party BAR Transfer.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011

Byzantine Fault-Tolerant Transaction Processing for Replicated Databases.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

Lucy in the sky without diamonds: Stealing confidential data in the cloud.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Anomaly-based intrusion detection in software as a service.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Byzantine Fault-Tolerant MapReduce: Faults are Not Just Crashes.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Vulnerability Discovery with Attack Injection.
IEEE Trans. Software Eng., 2010

Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery.
IEEE Trans. Parallel Distributed Syst., 2010

Asynchronous Byzantine consensus with 2f+1 processes.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Active Quorum Systems.
Proceedings of the Sixth Workshop on Hot Topics in System Dependability, 2010

EBAWA: Efficient Byzantine Agreement for Wide-Area Networks.
Proceedings of the 12th IEEE High Assurance Systems Engineering Symposium, 2010

Turquois: Byzantine consensus in wireless ad hoc networks.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces.
IEEE Trans. Parallel Distributed Syst., 2009

An Efficient Byzantine-Resilient Tuple Space.
IEEE Trans. Computers, 2009

Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Intrusion-tolerant self-healing devices for critical infrastructure protection.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
On Byzantine generals with alternative plans.
J. Parallel Distributed Comput., 2008

The CRUTIAL reference critical information infrastructure architecture: a blueprint.
Int. J. Syst. Syst. Eng., 2008

The Crutial Way of Critical Infrastructure Protection.
IEEE Secur. Priv., 2008

Finite Memory: A Vulnerability of Intrusion-Tolerant Systems.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

DepSpace: a byzantine fault-tolerant coordination service.
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008

2007
Automated Rule-Based Diagnosis through a Distributed Monitor System.
IEEE Trans. Dependable Secur. Comput., 2007

Worm-IT - A wormhole-based intrusion-tolerant group communication system.
J. Syst. Softw., 2007

Specification-based Intrusion Detection System for Carrier Ethernet.
Proceedings of the WEBIST 2007, 2007

When 3<i>f</i>+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Evaluating Byzantine Quorum Systems.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

On the Effects of Finite Memory on Intrusion-Tolerant Systems.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Resilient Intrusion Tolerance through Proactive and Reactive Recovery.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Intrusion Tolerance in Wireless Environments: An Experimental Evaluation.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

GRIDTS: A New Approach for Fault-Tolerant Scheduling in Grid Computing.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Exploiting Tuple Spaces to Provide Fault-Tolerant Scheduling on Computational Grids.
Proceedings of the Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 2007

The CRUTIAL Architecture for Critical Information Infrastructures.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

2006
From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures.
Comput. J., 2006

Brief Announcement: Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

An Infrastructure for Adaptive Fault Tolerance on FT-CORBA.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006

Using Attack Injection to Discover New Vulnerabilities.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Randomized Intrusion-Tolerant Asynchronous Services.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Solving Vector Consensus with a Wormhole.
IEEE Trans. Parallel Distributed Syst., 2005

Low complexity Byzantine-resilient consensus.
Distributed Comput., 2005

2004
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

2002
Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Intrusion-Tolerant Architectures: Concepts and Design.
Proceedings of the Architecting Dependable Systems [the book is a result of the ICSE 2002 Workshop on Software Architectures for Dependable Systems], 2002

The Design of a COTSReal-Time Distributed Security Kernel.
Proceedings of the Dependable Computing, 2002

2001
The Architecture of a Secure Group Communication System Based on Intrusion Tolerance.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

1998
Integrated Dymanic QoS Control for Multimedia Applications.
Proceedings of the Broadband European Networks and Multimedia Services, 1998

1995
Low-Level Multimedia Synchronization Algorithms on Broadband Networks.
Proceedings of the Third ACM International Conference on Multimedia '95, 1995


  Loading...