Paulo Veríssimo

According to our database1, Paulo Veríssimo
  • authored at least 143 papers between 1988 and 2017.
  • has a "Dijkstra number"2 of three.

Awards

IEEE Fellow

IEEE Fellow 2008, "For contributions to dependable and secure distributed computing".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
ANCHOR: logically-centralized security for Software-Defined Networks.
CoRR, 2017

The KISS principle in Software-Defined Networking: An architecture for Keeping It Simple and Secure.
CoRR, 2017

Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come.
Proceedings of the Security Protocols XXV, 2017

A Perspective of Security for Mobile Service Robots.
Proceedings of the ROBOT 2017: Third Iberian Robotics Conference, 2017

Meeting the Challenges of Critical and Extreme Dependability and Security.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Cloud-Assisted Read Alignment and Privacy.
Proceedings of the 11th International Conference on Practical Applications of Computational Biology & Bioinformatics, 2017

How Can Photo Sharing Inspire Sharing Genomes?
Proceedings of the 11th International Conference on Practical Applications of Computational Biology & Bioinformatics, 2017

2016
JITeR: Just-in-time application-layer routing.
Computer Networks, 2016

Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control.
Proceedings of the 1st Workshop on System Software for Trusted Execution, 2016

Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
Software-Defined Networking: A Comprehensive Survey.
Proceedings of the IEEE, 2015

A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

SSIV 2015 Keynote II: From Embedded Systems to Autonomous Cooperating Objects.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

MB4CP 2015 Keynote II: Resilience of Cyber-Physical Energy Systems.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

2014
Software-Defined Networking: A Comprehensive Survey.
CoRR, 2014

SCFS: A Shared Cloud-backed File System.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

2013
Efficient Byzantine Fault-Tolerance.
IEEE Trans. Computers, 2013

E-biobanking: What Have You Done to My Cell Samples?
IEEE Security & Privacy, 2013

Benchmarking some Portuguese S&T system research units
CoRR, 2013

BFT-TO: Intrusion Tolerance with Less Replicas.
Comput. J., 2013

Towards secure and dependable software-defined networks.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

Experiences with Fault-Injection in a Byzantine Fault-Tolerant Protocol.
Proceedings of the Middleware 2013, 2013

The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Adaptare: Supporting automatic and dependable adaptation in dynamic environments.
TAAS, 2012

Security and Dependability for Federated Cloud Platforms (Dagstuhl Seminar 12281).
Dagstuhl Reports, 2012

Critical Utility Infrastructural Resilience
CoRR, 2012

On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

The TClouds architecture: Open and resilient cloud-of-clouds computing.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

TRONE: Trustworthy and Resilient Operations in a Network Environment.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Trust and Privacy.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Monitoring and Evaluation of Semantic Rooms.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

CoMiFin Architecture and Semantic Rooms.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Collaborative Inter-domain Stealthy Port Scan Detection Using Esper Complex Event Processing.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Collaborative Attack Detection Using Distributed Hash Tables.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

Distributed Attack Detection Using Agilis.
Proceedings of the Collaborative Financial Infrastructure Protection, 2012

2011
RITAS: Services for Randomized Intrusion Tolerance.
IEEE Trans. Dependable Sec. Comput., 2011

Byzantine consensus in asynchronous message-passing systems: a survey.
IJCCBS, 2011

Randomization can be a healer: consensus with dynamic omission failures.
Distributed Computing, 2011

Reverse Engineering of Protocols from Network Traces.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Enforcing Dependability and Timeliness in CANELy - Application to Spaceborne Data Communication Systems.
Proceedings of the PECCS 2011, 2011

Recursive virtual machines for advanced security mechanisms.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

2010
Vulnerability Discovery with Attack Injection.
IEEE Trans. Software Eng., 2010

Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery.
IEEE Trans. Parallel Distrib. Syst., 2010

Security Made, Not Perfect, But Automatic (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Security Made, Not Perfect, But Automatic.
Proceedings of the Security Protocols XVIII, 2010

Building a Time- and Space-Partitioned Architecture for the Next Generation of Space Vehicle Avionics.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2010

RAVE: Replicated antivirus engine.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28, 2010

2009
Randomization Can Be a Healer: Consensus with Dynamic Omission Failures.
Proceedings of the Distributed Computing, 23rd International Symposium, 2009

Applying Architectural Hybridization in Networked Embedded Systems.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

Architecting Robustness and Timeliness in a New Generation of Aerospace Systems.
Proceedings of the Architecting Dependable Systems VII, 2009

Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
On Byzantine generals with alternative plans.
J. Parallel Distrib. Comput., 2008

The Crutial Way of Critical Infrastructure Protection.
IEEE Security & Privacy, 2008

Information Assurance Technology Forecast 2008.
IEEE Security & Privacy, 2008

A framework for dependable QoS adaptation in probabilistic environments.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Finite Memory: A Vulnerability of Intrusion-Tolerant Systems.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

Detection and Prediction of Resource-Exhaustion Vulnerabilities.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

2007
Automated Rule-Based Diagnosis through a Distributed Monitor System.
IEEE Trans. Dependable Sec. Comput., 2007

Worm-IT - A wormhole-based intrusion-tolerant group communication system.
Journal of Systems and Software, 2007

When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Architecture and Implementation of an Embedded Wormhole.
Proceedings of the IEEE Second International Symposium on Industrial Embedded Systems, 2007

On the Effects of Finite Memory on Intrusion-Tolerant Systems.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Resilient Intrusion Tolerance through Proactive and Reactive Recovery.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Intrusion Tolerance in Wireless Environments: An Experimental Evaluation.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

The CRUTIAL Architecture for Critical Information Infrastructures.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

Analysis of a Redundant Architecture for Critical Infrastructure Protection.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

2006
Guest Editorial for the Special Issue on the 2005 IEEE/IFIP Conference on Dependable Systems and Networks, including the Dependable Computing and Communications and Performance and Dependability Symposia.
IEEE Trans. Dependable Sec. Comput., 2006

Travelling through wormholes: a new look at distributed systems models.
SIGACT News, 2006

Intrusion-tolerant middleware: the road to automatic security.
IEEE Security & Privacy, 2006

From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures.
Comput. J., 2006

Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Proactive resilience through architectural hybridization.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Generic-Events Architecture: Integrating Real-World Aspects in Event-Based Systems.
Proceedings of the Architecting Dependable Systems IV [the book is a result of the ICSE 2006 and DSN 2006 workshops], 2006

Thou Shalt Not Trust non-Trustworthy Systems.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006

Integrating Inaccessibility Control and Timer Management in CANELy.
Proceedings of 11th IEEE International Conference on Emerging Technologies and Factory Automation, 2006

Using Attack Injection to Discover New Vulnerabilities.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Randomized Intrusion-Tolerant Asynchronous Services.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture.
Proceedings of the Critical Information Infrastructures Security, 2006

2005
Solving Vector Consensus with a Wormhole.
IEEE Trans. Parallel Distrib. Syst., 2005

Guidelines for a graduate curriculum on embedded software and systems.
ACM Trans. Embedded Comput. Syst., 2005

A New Programming Model for Dependable Adaptive Real-Time Applications.
IEEE Distributed Systems Online, 2005

Low complexity Byzantine-resilient consensus.
Distributed Computing, 2005

Resilient State Machine Replication.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Dependable Adaptive Real-Time Applications in Wormhole-based Systems.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Tolerating Intrusions in Grid Systems.
Proceedings of the International Conference on Security and Management, 2004

An architectural framework and a middleware for cooperating smart components.
Proceedings of the First Conference on Computing Frontiers, 2004

2003
Event-Driven Support of Real-Time Sentient Objects.
Proceedings of the 8th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2003), 2003

Trustworthiness of Open Information Systems: How Should It Be Achieved?
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Node Failure Detection and Membership in CANELy.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Uncertainty and Predictability: Can They Be Reconciled?
Proceedings of the Future Directions in Distributed Computing, 2003

2002
The Timely Computing Base Model and Architecture.
IEEE Trans. Computers, 2002

Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Intrusion-Tolerant Architectures: Concepts and Design.
Proceedings of the Architecting Dependable Systems [the book is a result of the ICSE 2002 Workshop on Software Architectures for Dependable Systems], 2002

The Design of a COTSReal-Time Distributed Security Kernel.
Proceedings of the Dependable Computing, 2002

Generic Timing Fault Tolerance using a Timely Computing Base.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
The logically instantaneous communication mode: a communication abstraction.
Future Generation Comp. Syst., 2001

Using the Timely Computing Base for Dependable QoS Adaptation.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Measuring Distributed Durations with Stable Error.
Proceedings of the 22nd IEEE Real-Time Systems Symposium (RTSS 2001), 2001

The Architecture of a Secure Group Communication System Based on Intrusion Tolerance.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

2000
A Dynamic Light-Weight Group Service.
J. Parallel Distrib. Comput., 2000

he Timely Computing Base: Timely Actions in the Presence of Uncertain Timeliness.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Logically Instantaneous Communication on Top of Distributed Memory Parallel Machines.
Proceedings of the Parallel Computing Technologies, 1999

Embedded Platforms for Distributed Real-Time Computing: Challenges and Results.
Proceedings of the 2nd International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '99), 1999

A Columbus' Egg Idea for CAN Media Redundancy.
Proceedings of the Digest of Papers: FTCS-29, 1999

Time in Distributed System Models and Algorithms.
Proceedings of the Advances in Distributed Systems, 1999

Topology-Aware Algorithms for Large-Scale Communication.
Proceedings of the Advances in Distributed Systems, 1999

Support for Distributed CSCW Applications.
Proceedings of the Advances in Distributed Systems, 1999

1998
Using Light-Weight Groups to Handle Timing Failures in Quasi-Synchronous Systems.
Proceedings of the 19th IEEE Real-Time Systems Symposium, 1998

Fault-Tolerant Broadcasts in CAN.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
CesiumSpray: a Precise and Accurate Global Time Service for Large-scale Systems.
Real-Time Systems, 1997

On the Role of Time in Distributed Systems.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997

How Hard is Hard Real-time Communication on Field-Buses?.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
Causal Delivery Protocols in Real-time Systems: A Generic Model.
Real-Time Systems, 1996

A Transparent Light-Weight Group Service.
Proceedings of the 15th Symposium on Reliable Distributed Systems, 1996

Totally Ordered Multicast in Large-Scale Systems.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

Enhancing Dependability of Cooperative Applications in Partitionable Environments.
Proceedings of the Dependable Computing, 1996

Timing Failure Detection and Real-Time Group Communication in Quasi-Synchronous Systems.
Proceedings of the Eighth Euromicro Workshop on Real-Time Systems, 1996

Efficient Communication in a Design Environment.
Proceedings of the 33st Conference on Design Automation, 1996

1995
Using Tailored Failure Suspectors to Support Distributed Cooperative Applications.
Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, 1995

Causal Separators for Large-Scale Multicast Communication.
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

Reliable Computing Over Mobile Networks.
Proceedings of the 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), 1995

The impact of group communication paradigms on groupware support.
Proceedings of the 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), 1995

1994
Ordering and Timeliness Requirements of Dependable Real-Time Programs.
Real-Time Systems, 1994

A Replication-Transparent Remote Invocation Protocol.
Proceedings of the 13th Symposium on Reliable Distributed Systems, 1994

How to avoid cost of causal communication in large-scale Systems.
Proceedings of the 6th ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, 1994

1993
Using Atomic Broadcast to Implement a posteriori Agreement for Clock Synchronization.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

A Low-level Processor Group Membership Protocol for LANS.
Proceedings of the 13th International Conference on Distributed Computing Systems, 1993

1992
xAMp: A Multi-primitive Group Communications Service.
Proceedings of the 11th Symposium on Reliable Distributed Systems, 1992

Requirements for high performance group support in distributed systems.
Proceedings of the 5th ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring, 1992

Group orientation: a paradigm for modern distributed systems.
Proceedings of the 5th ACM SIGOPS European Workshop: Models and Paradigms for Distributed Systems Structuring, 1992

A Study on the Inaccessibility Characteristics of ISO 8802/4 Token-Bus LANs.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

A posteriori Agreement for Fault-Tolerant Clock Synchronization on Broadcast Networks.
Proceedings of the Digest of Papers: FTCS-22, 1992

1990
Real-Time Data Management with Clock-Less Reliable Broadcast Protocols.
Workshop on the Management of Replicated Data, 1990

Reliable Broadcast for Fault-Tolerance on Local Computer Networks.
Proceedings of the Ninth Symposium on Reliable Distributed Systems, 1990

Design of fault tolerant distributed systems: the fail-controlled approach.
Proceedings of the 4th ACM SIGOPS European Workshop, Bologna, Italy, September 3-5, 1990, 1990

The Delta-4 extra performance architecture (XPA).
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

Formal Specification and Verification of a Network Independent Atomic Multicast Protocol.
Proceedings of the Formal Description Techniques, 1990

1989
AMp: A Highly Parallel Atomic Multicast Protocol.
Proceedings of the SIGCOMM '89, 1989

1988
Redundant media mechanisms for dependable communication in token-bus LANs.
Proceedings of the 13th Conference on Local Computer Networks, 1988

The Delta-4 approach to dependability in open distributed computing systems.
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988


  Loading...