REGENESYS - Regeneration of Replicated Systems
What is REGENESYS? > Related Papers

Related Papers


Efficient Byzantine Fault Tolerance
Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Verissimo
IEEE Transactions on Computers, vol. 62, n. 1, pp. 16-30, Jan. 2013

On the Reliability and Availability of Replicated and Rejuvenating Systems Under Stealth Attacks and Intrusions
Luís T. A. N. Brandão and Alysson N. Bessani
Journal of the Brazilian Computer Society, Vol. 18, pp. 61-80, Springer London, 2012.


Gestão de Estado Eficiente no Serviço de Coordenação DDS
J. Félix, A. Bessani, M. Correia.
Actas do INFORUM 2012, Setembro 2012.


The Final Frontier: Confidentiality and Privacy in the Cloud
Francisco Rocha, Salvador Abreu, Miguel Correia
IEEE Computer, vol. 44, n. 9, pp. 44-50, Sep. 2011


On the Reliability and Availability of Systems Tolerant to Steath Intrusion.
Luis T. A. N. Brandão, Alysson Bessani. 
LADC'11: The 5th Latin-American Symposium on Dependable Computing. São José dos Campos, Brazil. April 2011.


Byzantine Fault-Tolerant Transaction Processing for Replicated Databases. Aldelir Luiz, Lau Cheuk Lung and Miguel Correia In Proceedings of the 10th IEEE International Symposium on Network Computing and Applications (NCA). Cambridge, MA USA, July 2011.


Byzantine Consensus in Asynchronous Message-Passing Systems: A Survey
M. Correia, G. S. Veronese, N. F. Neves, P. Verissimo 
International Journal of Critical Computer-Based Systems, vol. 2, n. 2, pp. 141-161, 2011.


Desempenho e Escalabilidade de uma Biblioteca de Replicação de Máquinas de Estados Tolerante a Faltas Bizantinas
João Sousa, Bruno Branco e Brito, Alysson Bessani, Marcelo Pasin.
Actas do Inforum 2011, Setembro 2011.


EBAWA: Efficient Byzantine Agreement for Wide-Area Networks
Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung.
Proceedings of the 12th IEEE International High Assurance Systems Engineering Symposium (HASE). November 2010.


Asynchronous Byzantine Consensus with 2f+1 Processes
Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung 
Proceedings of the 25th Annual ACM Symposium on Applied Computing, March 2010.


Active Quorum Systems
A. N. Bessani, P. Sousa, M. Correia. 
Proceedings of the Workshop on Hot Topics in System Dependability (HotDep), October 2010.


TYPHON: Um Serviço de Autenticação e Autorização Tolerante a Intrusões
João Sousa, Alysson Bessani, Paulo Sousa
Actas do 2º INForum Simpósio de Informática, September 2010.


Related publications:


Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo
IEEE Transactions on Parallel and Distributed Systems, vol. 21, n. 4, pp. 452-465, April 2010.


Resilient Intrusion Tolerance through Proactive and Reactive Recovery
Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, pages 373-380, December 2007.


Hypervisor-based Efficient Proactive Recovery
Hans P. Reiser, Ruediger Kapitza
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems(SRDS'07), Bejing, China, October 2007.


Intrusion-Tolerant Protection for Critical Infrastructures
Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo
Technical Report DI/FCUL TR-07-8. Department of Computer Science, University of Lisboa. April 2007.


How Practical Are Intrusion-Tolerant Distributed Systems?
Rafael Obelheiro, Alysson Bessani, Lau Lung, Miguel Correia
Technical Report DI/FCULTR-06-15. Department of Computer Science, University of Lisboa.
September 2006.