Semantic search
From Navigators
Publications
- Diego Kreutz, Jiangshan Yu, Paulo Verissimo, Fernando Ramos, Cátia Magalhães, “The KISS principle in Software-Defined Networking: a framework for secure communications”, IEEE Security & Privacy, Oct. 2018.
- Alysson Bessani, Nuno Ferreira Neves, Paulo Verissimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia, “JITeR: Just-In-Time Application-Layer Routing”, Computer Networks, vol. 104, pp. 122–136, Jul. 2016.
- Vinicius Vielmo Cogo, Alysson Bessani, Francisco M. Couto, Paulo Verissimo, “A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data”, in Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2015), Denver, CO, US, Oct. 2015.
- Fernando Ramos, Diego Kreutz, Paulo Verissimo, “Software-Defined Networks: On the Road to the Softwarization of Networking”, Cutter IT Journal, May 2015.
- Diego Kreutz, Fernando Ramos, Paulo Verissimo, Christian Rothenberg, Siamak Azodolmolky, Steve Uhlig, “Software-defined networking: A comprehensive survey”, Proceedings of the IEEE, vol. 103, no. 1, Jan. 2015.
- Alysson Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, Paulo Verissimo, “SCFS: A Shared Cloud-backed File System”, in Proceedings of the 2014 USENIX Annual Technical Conference (USENIX-ATC), Philadelphia, PA, US, Jun. 2014.
- Diego Kreutz, Fernando Ramos, Paulo Verissimo, “Anchors of Trust for Autonomic and Secure Configuration and Assessment in SDN”, in Fast Abstract at the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, USA, Jun. 2014.
- Rolando Martins, Rajeev Gandhi, Priya Narasimhan, Soila Pertet, António Casimiro, Diego Kreutz, Paulo Verissimo, “Experiences with Fault-Injection in a Byzantine Fault-Tolerant Protocol”, in Middleware 2013, Eyers, David and Schwan, Karsten, Eds., ser. Lecture Notes in Computer Science. Beijing, China: Springer Berlin Heidelberg, Dec. 2013, vol. 8275, pp. 41–61.
- Paulo Verissimo, Alysson Bessani, “E-biobanking: What Have You Done to My Cell Samples?”, IEEE Security & Privacy, vol. 11, no. 6, pp. 62–65, Dec. 2013.
- Diego Kreutz, Fernando Ramos, Paulo Verissimo, “Towards Secure and Dependable Software-Defined Networks”, in ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Hong Kong, China, Aug. 2013.
- Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “BFT-TO: Intrusion Tolerance with”, The Computer Journal, vol. 56, no. 6, pp. 693–715, Jun. 2013.
- Francisco M. Couto, Daniel Faria, Bruno Tavares, Pedro Gonçalves, Paulo Verissimo, “Benchmarking some Portuguese S&T system research units (2nd Edition)”, University of Lisbon, DI-FCUL, Tech. Rep. TR-2013-03, Feb. 2013.
- Giuliana Santos Veronese, Miguel Correia, Alysson Bessani, Lau Cheuk Lung, Paulo Verissimo, “Efficient Byzantine Fault-Tolerance”, IEEE Transactions on Computers, vol. 62, no. 1, pp. 16–30, Jan. 2013.
- Mônica Dixit, António Casimiro, Paulo Verissimo, Paolo Lollini, Andrea Bondavalli, “Adaptare: Supporting automatic and dependable adaptation in dynamic environments”, ACM Transactions on Autonomous and Adaptive Systems, vol. 7, no. 2, pp. 18:1–18:25, Jul. 2012. http://doi.acm.org/10.1145/2240166.2240168
- Amir Soltani Nezhad, António Casimiro, Paulo Verissimo, “A Multi-Layered Architecture for a Secure Virtualization Environment”, in Fast Abstract at the 2012 International Conference on Dependable Systems and Networks, Boston, MA, USA, Jun. 2012.
- António Casimiro, Paulo Verissimo, Diego Kreutz, Filipe Araújo, Raul Barbosa, Samuel Neves, Bruno Sousa, Marília Curado, Carlos Silva, Rajeev Gandhi, Priya Narasimhan, “TRONE: Trustworthy and Resilient Operations in a Network Environment”, in Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on, Boston, MA, USA, Jun. 2012, pp. 1–6. http://dx.doi.org/10.1109/DSNW.2012.6264694
- Paulo Verissimo, Alysson Bessani, Marcelo Pasin, “The TClouds Architecture:Open and Resilient Cloud-of-clouds Computing”, in Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on, Jun. 2012.
- Miguel Correia, Pedro Costa, Marcelo Pasin, Alysson Bessani, Fernando Ramos, Paulo Verissimo, “On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Cloud”, in First International Workshop on Dependability Issues in Cloud Computing (DISCCO 2012), San Francisco, California, 2012.
- Bernhard kauer, Paulo Verissimo, Alysson Bessani, “Recursive Virtual Machines for Advanced Security Mechanisms”, in Proceedings of the 1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (DCDV'11). DSN'11 supplemental volume., Jun. 2011.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “RITAS: Services for Randomized Intrusion Tolerance”, IEEE Transactions on Dependable and Secure Computing, vol. 8, n. 1, pp. 122-136, Jan.-Feb. 2011., Jan. 2011.
- José Rufino, João Pedro Craveiro, Paulo Verissimo, “Architecting Robustness and Timeliness in a New Generation of Aerospace Systems”, in Architecting Dependable Systems VII, António Casimiro, Rogério de Lemos, Cristina Gacek, Eds., ser. LNCS. Springer, Nov. 2010, vol. 6420.
- Francisco M. Couto, Ivan Andrade, Pedro Gonçalves, Paulo Verissimo, “Benchmarking some Portuguese S&T system research units”, University of Lisbon, DI-FCUL, Tech. Rep. TR-2010-07, Nov. 2010. http://hdl.handle.net/10455/6682
- José Rufino, João Pedro Craveiro, Paulo Verissimo, “Building a time- and space-partitioned architecture for the next generation of space vehicle avionics”, in Proceedings of the 8th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (SEUS 2010), Waidhofen an der Ybbs, Austria, Oct. 2010.
- João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, Rui Neves, “Vulnerability Removal with Attack Injection”, IEEE Transactions on Software Engineering, Special issue on Evaluation and Improvement of Software Dependability, Jun. 2010.
- João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Using Attack Injection on Closed Protocols”, in Fast Abstract in Supplement of the International Conference on Dependable Systems and Networks (DSN'10), Jun. 2010.
- Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery”, IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 4, pp. 452-465, Apr. 2010., Apr. 2010.
- Francisco M. Couto, Tiago Grego, Catia Pesquita, Paulo Verissimo, “Handling self-citations using Google Scholar”, International Journal of Scientometrics, Informetrics and Bibliometrics, vol. 13, no. 2, Dec. 2009.
- Mônica Dixit, António Casimiro, Paulo Verissimo, Paolo Lollini, Andrea Bondavalli, “A Probabilistic Framework for Automatic and Dependable Adaptation in Dynamic Environments”, Department of Informatics, University of Lisboa, Tech. Rep. TR-09-19, Dec. 2009. http://hdl.handle.net/10455/3273
- António Casimiro, José Rufino, Luís Marques, Mário Calha, Paulo Verissimo, “Applying architectural hybridization in networked embedded systems”, in Proceedings of the 7th IFIP WG 10.2 International Workshop (SEUS 2009), Software Technologies for Embedded and Ubiquitous Systems, LNCS 5860, Sunggu Lee and Priya Narasimhan (Eds), Newport Beach, CA, USA, November 2009, Nov. 2009.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Randomization can be a Healer: Consensus with Dynamic Omission Failures”, in Proceedings of the 23rd International Symposium on Distributed Computing (DISC 2009), pages 63-77, Sept. 2009.
- Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Cheap Intrusion-Tolerant Protection for CRUTIAL Things”, Missing institution, Tech. Rep., Aug. 2009. DI-FCUL TR-2009-14
- Paulo Verissimo, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Intrusion-Resilient Middleware Design and Validation”, in Information Assurance, Security and Privacy Services, ser. Handbooks in Information Systems. Emerald Group Publishing Limited, May 2009, vol. 4, pp. 615–678.
- Mônica Dixit, António Casimiro, Paulo Verissimo, “Probabilistic Adaptive Time-Aware Consensus”, in Eurosys 2009, WIP session, Nuremberg, Germany, March 2009, Mar. 2009.
- Paulo Verissimo, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa, “Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned”, in Proceedings of the 42nd Hawaii International Conference for the Systems Sciences (HICSS-42), Waikoloa, Hawaii, January 2009., Jan. 2009.
- Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “The CRUTIAL Way of Critical Infrastructure Protection”, IEEE Security and Privacy, vol. 6, no. 6, pp. 44-51, Nov/Dec 2008., Dec. 2008.
- João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Detection and Prediction of Resource-Exhaustion Vulnerabilities”, in Proceedings of the 19th IEEE International Symposium on Software Reliability Engineering, Seattle/Redmond, WA, USA, Nov. 2008.
- Hugo Ortiz, Paulo Sousa, Paulo Verissimo, “Towards Intrusion-Tolerant Process Control Software”, in 4th National Conference on Segurança Informática nas Organizações (SINO 2008), Coimbra, Portugal, October 2008., Oct. 2008.
- Miguel Correia, Alysson Bessani, Paulo Verissimo, “On Byzantine Generals with Alternative Plans”, Journal of Parallel and Distributed Computing, Vol. 68, Issue 9, pages 1291-1296, Elsevier., Sept. 2008.
- António Casimiro, Paolo Lollini, Mônica Dixit, Andrea Bondavalli, Paulo Verissimo, “A framework for dependable QoS adaptation in probabilistic environments”, in Proceedings of the 23rd ACM Symposium on Applied Computing, Dependable and Adaptive Distributed Systems Track, Fortaleza, Ceara, Brazil, March 2008., Mar. 2008.
- Steven M. Bellovin, Terry V. Benzel, Bob Blakley, Dorothy E. Denning, Whitfield Diffie, Jeremy Epstein, Paulo Verissimo, “Information Assurance Technology Forecast 2008”, IEEE Security & Privacy, vol. 6, no. 1, pp. 10-17, January/February, 2008., Jan. 2008.
- Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, “The CRUTIAL Reference Critical Information Infrastructure Architecture: A Blueprint”, International Journal of System of Systems Engineering, vol. 1, no. 1/2, pp. 78–95, Jan. 2008.
- Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Resilient Intrusion Tolerance through Proactive and Reactive Recovery”, in Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 07), Melbourne, Australia, pages 373-380, December 2007., Dec. 2007.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Verissimo, “Intrusion Tolerance in Wireless Environments: An Experimental Evaluation”, in Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 07), Dec. 2007.
- Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Verissimo, “On the Effects of Finite Memory on Intrusion-Tolerant Systems”, in The 13th IEEE Pacific Rim International Symposiumon Dependable Computing (PRDC 07), Dec. 2007.
- João Antunes, Nuno Ferreira Neves, Paulo Verissimo, “Finding Local Resource Exhaustion Vulnerabilities”, in Student paper in Proceedings of the International Symposium on Software Reliability Engineering (ISSRE), Trollhättan, Sweden, November 2007., Nov. 2007.
- Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel Correia, Paulo Verissimo, “Automated Rule-Based Diagnosis Through A Distributed Monitor System”, IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 266-279, Oct-Dec, 2007, Oct. 2007.
- Alysson Bessani, Miguel Correia, Henrique Moniz, Nuno Ferreira Neves, Paulo Verissimo, “When 3f+1 is not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus”, in Proceedings of 21st International Symposium on Distributed Computing (DISC 07), Sept. 2007.
- Paulo Verissimo, “Assumptions: The Trojan Horses of Secure Protocols”, in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.
- Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, A. Abou El Kalam, Andrea Bondavalli, Alessandro Daidone, “The CRUTIAL Architecture for Critical Information Infrastructures”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.
- Alessandro Daidone, Silvano Chiaradonna, Andrea Bondavalli, Paulo Verissimo, “Analysis of a Redundant Architecture for Critical Infrastructure Protection”, in Architecting Dependable Systems V, Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek, Henry Muccini, Marco Vieira, Eds., ser. LNCS. Springer, Aug. 2007, vol. 5135.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “Hidden Problems of Asynchronous Proactive Recovery”, in Third Workshop on Hot Topics in System Dependability (HotDep 2007), Edinburgh, UK, Jun. 2007.
- António Casimiro, Jörg Kaiser, Paulo Verissimo, “Generic-Events Architecture: Integrating real-world aspects in event-based systems”, in Architecting Dependable Systems IV, Rogério de Lemos, Cristina Gacek, Alexander Romanovsky, Eds., ser. LNCS. Springer, Jun. 2007, vol. 4615.
- Alysson Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Intrusion-Tolerant Protection for Critical Infrastructures”, Missing institution, Tech. Rep., Apr. 2007. Technical Report DI/FCUL TR-07-8. Department of Computer Science, University of Lisboa. April 2007.
- Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Verissimo, “Worm-IT - A Wormhole-based Intrusion-Tolerant Group Communication System”, Journal of Systems & Software, vol. 80, n. 2, pages 178-197, Elsevier, February 2007, Feb. 2007.
- José Rufino, Carlos Almeida, Paulo Verissimo, Guilherme Arroz, “Enforcing Dependability and Timeliness in Controller Area Networks”, in Proceedings of the 32nd Annual Conference of the IEEE Industrial Electronics Society (IECON06), Paris, France, November, 2006., Nov. 2006.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, William H. Sanders, “Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available”, in Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS), Leeds, UK, pages 71-80, October 2006., Oct. 2006.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols”, in Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS), Leeds, UK, October 2006, Oct. 2006.
- António Casimiro, Odorico Mendizabal, Paulo Verissimo, “On the development of dependable embedded applications using specialized wormholes”, in 3rd International Workshop on Dependable Embedded Systems (WDES-06), in conjunction with the 25th Symposium on Reliable Distributed Systems, Leeds, UK, October 2006, Oct. 2006.
- José Rufino, Paulo Verissimo, Carlos Almeida, Guilherme Arroz, “Integrating Inaccessibility Control and Timer Management in CANELy”, in Proceedings of the 11th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2006), Prague, Czech Republic, September, 2006., Sept. 2006.
- Paulo Verissimo, Nuno Ferreira Neves, C. Cachin, J. A. Poritz, D. Powell, Yves Deswarte, R. J. Stroud, I. S. Welch, “Intrusion-Tolerant Middleware: The Road to Automatic Security”, IEEE Security & Privacy, vol. 4, no. 4, pp. 54-62, Jul./Aug. 2006., Aug. 2006.
- Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, “CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture”, in Proceedings of the 1st International Workshop on Critical Information Infrastructures @ ISC’06, Samos - Greece, August 2006., Aug. 2006.
- Paulo Verissimo, “Thou Shalt Not Trust non-Trustworthy Systems”, Jul. 2006. Keynote at the Workshop on Assurance in Distributed Systems and Networks (ADSN2006), with the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), Lisboa, Portugal, July 2006.
- Nuno Ferreira Neves, João Antunes, Miguel Correia, Paulo Verissimo, Rui Neves, “Using Attack Injection to Discover New Vulnerabilities”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, June 2006., Jun. 2006.
- José Rufino, Paulo Verissimo, Guilherme Arroz, Carlos Almeida, “Control of Inaccessibility in CANELy”, in Proceedings of the 6th IEEE International Workshop on Factory Communication Systems (WFCS06), Torino, Italy, June, 2006., Jun. 2006.
- Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Randomized Intrusion-Tolerant Asynchronous Services”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN), Philadelphia, USA, pages 568-577, June 2006, Jun. 2006.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “Proactive Resilience through Architectural Hybridization”, in Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, pages 686-690, April 2006., Apr. 2006.
- G. Dondossola, G. Deconinck, F. Di Giandomenico, S. Donatelli, M. Kaaniche, Paulo Verissimo, “Critical Utility Infrastructure Resilience”, in In Workshop on Security and Networking in Critical Real-Time and Embedded Systems (CRTES'06), with RTAS'06, San Jose, California, USA, April 2006., Apr. 2006.
- Paulo Verissimo, “Travelling through Wormholes: a new look at Distributed Systems Models”, SIGACT News, vol. 37, no. 1, pages 66-81, 2006., Mar. 2006.
- Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures”, Computer Journal. vol. 41, n. 1, pp 82-96, January 2006., Jan. 2006.
- Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Solving Vector Consensus with a Wormhole”, IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 12, pp. 1120-1131, December 2005., Dec. 2005.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “Resilient State Machine Replication”, in In Proceedings of the 11th Pacific Rim International Symposium on Dependable Computing (PRDC), Changsha, China, pages 305-309, December 2005., Dec. 2005.
- José Pascoal, Tiago Jorge, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “FTP Tolerante a Intrusões”, in In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, November 2005., Oct. 2005.
- Pan Jieke, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Um Núcleo de Segurança Distribuído para Suporte a Protocolos Tolerantes a Intrusões”, in In 1ª Conferência Nacional sobre Segurança Informática nas Organizações. Covilhã, Portugal, November 2005, Oct. 2005.
- Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, Lau Cheuk Lung, “Low Complexity Byzantine-Resilient Consensus”, Distributed Computing, vol. 17, n. 3, pp. 237--249, March 2005. http://www.springerlink.com/index/10.1007/s00446-004-0110-7, Oct. 2005.
- João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, Rui Neves, “Diagnóstico de Vulnerabilidades através da Injecção de Ataques”, in 1ª Conferência Nacional sobre Segurança Informática nas Organizações (SINO 2005), Covilhã, Portugal., Oct. 2005.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?”, in In Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN'05). Yokohama, Japan, pages 98-107, June 2005., Jun. 2005.
- Pedro Martins, Paulo Sousa, António Casimiro, Paulo Verissimo, “A New Programming Model for Dependable Adaptive Real-Time Applications”, IEEE Distributed Systems Online, vol. 6, no. 5, 2005., May 2005.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “Proactive Resilience through Architectural Hybridization (extended version)”, Missing institution, Tech. Rep., May 2005. Technical Report DI/FCUL TR-05-8. Department of Computer Science, University of Lisboa. May 2005.
- Paulo Sousa, Nuno Ferreira Neves, Paulo Verissimo, “A New Approach to Proactive Recovery”, in In Fifth European Dependable Computing Conference (EDCC-5) Supplemental Volume. Budapest, Hungary, pages 35-40, April 2005., Apr. 2005.
- Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems”, in In Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianopolis, Brasil, pages 174-183, October 2004, Oct. 2004.
- Rafael Ferraz, João Sequeira, Bruno Gonçalves, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “An Intrusion-Tolerant Web Server based on the DISTRACT Architecture”, in In Workshop on Dependable Distributed Data Management, Florianopolis, Brasil, pages 45-50, October 2004., Oct. 2004.
- Tiago Jorge, José Pascoal, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “Concretização de um Sistema de Comunicação em Grupo Tolerante a Intrusões”, in In 7ª Conferência sobre Redes de Computadores. Leiria, Portugal, pages 111-122, October 2004., Oct. 2004.
- Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems”, Missing institution, Tech. Rep., Sept. 2004. Technical Report DI/FCUL TR-04-6. Department of Computer Science, University of Lisbon. July 2004.
- Pedro Martins, Paulo Sousa, António Casimiro, Paulo Verissimo, “Dependable Adaptive Real-Time Applications in Wormhole-based Systems”, in Proceedings of the International Conference on Dependable Systems and Networks (DSN'04), Florence, Italy, June 2004, Jul. 2004.
- Nuno Ferreira Neves, Miguel Correia, Paulo Verissimo, “Wormhole-Aware Byzantine Protocols”, in 2nd Bertinoro Workshop on Future Directions in Distributed Computing: Survivability - Obstacles and Solutions (FuDiCo: SOS), Bertinoro, Italy, June, 2004., Jun. 2004.
- Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo, “From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures”, Missing institution, Tech. Rep., Jun. 2004. Technical Report DI/FCUL TR-04-5. Department of Computer Science, University of Lisbon. June 2004.
- António Casimiro, Jörg Kaiser, Paulo Verissimo, “An Architectural Framework and a Middleware for Cooperating Smart Components”, in Proceedings of the First Conference on Computing Frontiers, Ischia, Italy, April 2004, Apr. 2004.
- Paulo Verissimo, Jörg Kaiser, António Casimiro, “An architecture to support interaction via Generic Events”, in 24th IEEE Real-time Systems Symposium, Work in Progress Proceedings, Cancun, Mexico, December 2003, Dec. 2003.
- Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Verissimo, “Low Complexity Byzantine-Resilient Consensus”, Missing institution, Tech. Rep., Oct. 2003. Technical Report DI/FCUL TR-03-25, Department of Computer Science, University of Lisbon. August 2003
- Paulo Verissimo, Nuno Ferreira Neves, Miguel Correia, “Intrusion-Tolerant Architectures: Concepts and Design”, in Architecting Dependable Systems, ser. LNCS. Springer-Verlag, Jun. 2003, vol. 2677, pp. 3–36. Extended version in http://hdl.handle.net/10455/2954
- José Rufino, Paulo Verissimo, Guilherme Arroz, “Node Failure Detection and Membership in CANELy”, in Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN03). San Francisco, California, USA, June 2003., Jun. 2003.
- Miguel Correia, Lau Cheuk Lung, Nuno Ferreira Neves, Paulo Verissimo, “A Simple Intrusion-Tolerant Reliable Multicast Protocol using the TTCB Model”, in Proceedings of the 21st Simpósio Brasileiro de Redes de Computadores, Natal, Brasil, May 2003, May 2003.
- G. Biegel, G. Blair, C. Brudna, V. Cahill, António Casimiro, S. Clarke, H. Duran-Limon, A. Fitzpatrick, A. Friday, B. Hughes, Jörg Kaiser, R. Meier, V. Reynolds, Paulo Verissimo, M. Wu, “The CORTEX Programming Model”, Missing institution, Tech. Rep., Apr. 2003. Technical Report DI/FCUL TR-03-19, Department of Computer Science, University of Lisbon. July 2003
- V. Cahill, António Casimiro, Jörg Kaiser, Pedro Martins, V. Reynolds, Paulo Sousa, Paulo Verissimo, M. Wu, “Proof-of-concept prototypes”, Missing institution, Tech. Rep., Apr. 2003. Technical Report DI/FCUL TR-03-20, Department of Computer Science, University of Lisbon. July 2003
- G. Blair, C. Brudna, V. Cahill, António Casimiro, R. Cunningham, H. Duran-Limon, Jörg Kaiser, Pedro Martins, Paulo Verissimo, “Preliminary Specification of Basic Services and Protocols”, Missing institution, Tech. Rep., Feb. 2003. Technical Report DI/FCUL TR-03-18, Department of Computer Science, University of Lisbon. July 2003
- A. Adelsbach, C. Cachin, Sadie Creese, Yves Deswarte, K. Kursawe, J.-C. Laprie, D. Powell, B. Randell, James Riordan, Peter Ryan, William Simmionds, R. J. Stroud, Paulo Verissimo, M. Waidner, Andreas Wespi, “Conceptual Model and Architecture of MAFTIA”, University of Lisbon, DI-FCUL, Tech. Rep. TR-03-1, Feb. 2003. http://hdl.handle.net/10455/2978
- Paulo Verissimo, “Uncertainty and Predictability: Can they be reconciled?”, in Future Directions in Distributed Computing, pp. 108-113, Springer Verlag LNCS 2584, May, 2003, Jan. 2003.
- Paulo Verissimo, António Casimiro, “Event-Driven Support of Real-Time Sentient Objects”, in Proceedings of the Eighth IEEE International Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003), Guadalajara, Mexico, Jan 2003, Jan. 2003.
- Paulo Verissimo, “Lessons Learned with NavTech: a Framework for Reliable Large-Scale Applications”, Missing institution, Tech. Rep., Dec. 2002. Technical Report DI/FCUL TR-02-17, Department of Computer Science, University of Lisbon. December 2002
- Paulo Sousa, Paulo Verissimo, “Towards a cooperating autonomous car”, in Proceedings of the 7th CaberNet Radicals Workshop, Bertinoro, Italy, Oct 2002, Oct. 2002.