FCUL

Displaying 1-7 of 7 results

  • White Papers // Apr 2010

    Turquois: Byzantine Consensus In Wireless Ad Hoc Networks

    The operation of wireless ad hoc networks is intrinsically tied to the ability of nodes to coordinate their actions in a dependable and efficient manner. The failure of some nodes and momentary breakdown of communications, either of accidental or malicious nature, should not result in the failure of the entire...

    Provided By FCUL

  • White Papers // Feb 2010

    Characterization of Inaccessibility in Wireless Networks: A Case Study on IEEE 802.15.4 Standard

    Wireless technology has been seen as the communication technology of the future. One of many challenges is the support for predictability and time-bounded communications over this technology. In this way, the control of temporary partitions, called inaccessibility, is of fundamental importance. For this reason, this paper makes a characterization of...

    Provided By FCUL

  • White Papers // Jul 2009

    Randomization Can Be a Healer: Consensus With Dynamic Omission Failures

    Wireless ad-hoc networks are being increasingly used in diverse contexts, ranging from casual meetings to disaster recovery operations. A promising approach is to model these networks as distributed systems prone to dynamic communication failures. This captures transitory disconnections in communication due to phenomena like interference and collisions, and permits an...

    Provided By FCUL

  • White Papers // Jun 2009

    Cheap Intrusion-Tolerant Protection for CRUTIAL Things

    This paper presented the CIS protection service, implemented by highly resilient distributed devices, aimed at protecting critical information infrastructures. The CIS has two distinguishing features: it is intrusion-tolerant, and it supports a rich access control model that takes into account application semantics. The design of this protection device solves the...

    Provided By FCUL

  • White Papers // May 2009

    Not Quickly, Just in Time: Improving the Timeliness and Reliability of Control Traffic in Utility Networks

    One important aspect of modern Critical Infrastructures (CI) like power grids is that the control of the physical processes (e.g., electricity transmission) is no longer done locally, but in a distributed way with SCADA/PCS systems. This distributed control is done over utility networks, typically wide-area IP networks that interconnect the...

    Provided By FCUL

  • White Papers // Apr 2009

    Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection

    Critical infrastructures like the power grid are essentially physical processes controlled by electronic devices. In the last decades, these electronic devices started to be controlled remotely through commodity computers, often directly or indirectly connected to the Internet. Therefore, many of these systems are currently exposed to threats similar to those...

    Provided By FCUL

  • White Papers // Sep 2008

    Designing Modular and Redundant Cyber Architectures for Process Control: Lessons Learned

    An architecture was recently proposed to protect the power grid, in the context of an European project. The design of the architecture, guided by an analysis of the evolution of critical information infrastructures, tried to be as generic as possible, with a view of possibly serving as reference cyber architecture...

    Provided By FCUL

  • White Papers // Feb 2010

    Characterization of Inaccessibility in Wireless Networks: A Case Study on IEEE 802.15.4 Standard

    Wireless technology has been seen as the communication technology of the future. One of many challenges is the support for predictability and time-bounded communications over this technology. In this way, the control of temporary partitions, called inaccessibility, is of fundamental importance. For this reason, this paper makes a characterization of...

    Provided By FCUL

  • White Papers // Jun 2009

    Cheap Intrusion-Tolerant Protection for CRUTIAL Things

    This paper presented the CIS protection service, implemented by highly resilient distributed devices, aimed at protecting critical information infrastructures. The CIS has two distinguishing features: it is intrusion-tolerant, and it supports a rich access control model that takes into account application semantics. The design of this protection device solves the...

    Provided By FCUL

  • White Papers // Apr 2010

    Turquois: Byzantine Consensus In Wireless Ad Hoc Networks

    The operation of wireless ad hoc networks is intrinsically tied to the ability of nodes to coordinate their actions in a dependable and efficient manner. The failure of some nodes and momentary breakdown of communications, either of accidental or malicious nature, should not result in the failure of the entire...

    Provided By FCUL

  • White Papers // Jul 2009

    Randomization Can Be a Healer: Consensus With Dynamic Omission Failures

    Wireless ad-hoc networks are being increasingly used in diverse contexts, ranging from casual meetings to disaster recovery operations. A promising approach is to model these networks as distributed systems prone to dynamic communication failures. This captures transitory disconnections in communication due to phenomena like interference and collisions, and permits an...

    Provided By FCUL

  • White Papers // May 2009

    Not Quickly, Just in Time: Improving the Timeliness and Reliability of Control Traffic in Utility Networks

    One important aspect of modern Critical Infrastructures (CI) like power grids is that the control of the physical processes (e.g., electricity transmission) is no longer done locally, but in a distributed way with SCADA/PCS systems. This distributed control is done over utility networks, typically wide-area IP networks that interconnect the...

    Provided By FCUL

  • White Papers // Apr 2009

    Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection

    Critical infrastructures like the power grid are essentially physical processes controlled by electronic devices. In the last decades, these electronic devices started to be controlled remotely through commodity computers, often directly or indirectly connected to the Internet. Therefore, many of these systems are currently exposed to threats similar to those...

    Provided By FCUL

  • White Papers // Sep 2008

    Designing Modular and Redundant Cyber Architectures for Process Control: Lessons Learned

    An architecture was recently proposed to protect the power grid, in the context of an European project. The design of the architecture, guided by an analysis of the evolution of critical information infrastructures, tried to be as generic as possible, with a view of possibly serving as reference cyber architecture...

    Provided By FCUL