. Bibliographie, Schéma d'autorisation pour les applications réparties sur Internet, Thèse de l'Institut National Polytechnique, 2004.

A. El-kalam, Etat des lieux sectoriel, conceptuel et terminologie en sécurité pour les systèmes d'information et de communications en santé et social, 2002.

]. J. Anderson-80 and . Anderson, Computer Security Threat Monitoring and Surveillance, 1980.

. Anderson, Fault Tolerance : Principles and Practice, 1981.

L. E. Bell and . Lapadula, Fault Tolerance, the Survival Attribute of Digital SystemsSecure Computer Systems: Unified Exposition and Multics Interpretation The MITRE Corporation, Proceedings of the IEEE, pp.299775-306, 1976.

]. K. Biba, Integrity Consideration for Secure Computer Systems, 1977.

. Blain, Intrusion-Tolerant Security Servers for Delta-4, ESPRIT Conference 90, 1990.
DOI : 10.1007/978-94-009-0705-8_25

. Brewer, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, 1989.
DOI : 10.1109/SECPRI.1989.36295

A. Bronstein, J. Das, M. Duro, R. Friedrich, G. Kleyner et al., Random oracles in Constantinople : Practical asynchronous Byzantine agreement using cryptography, Proc. of the 19th ACM Symposium on Principles of Distributed Computing, 2000.

M. Chérèque, D. Powell, P. Reynier, J. Richier, and J. Voiron, Active replication in Delta-4, [1992] Digest of Papers. FTCS-22: The Twenty-Second International Symposium on Fault-Tolerant Computing, pp.28-37, 1992.
DOI : 10.1109/FTCS.1992.243618

S. Rowe, R. Staniford-chen, D. Yip, . D. Zerkle, D. R. Clark et al., The Design of GrIDS. A Graph-Based Intrusion Detection SystemA Comparison of Commercial and Military Computer Security Policies, Proc. Int. Symp. on Security and Privacy, 1987.

. Cowen, Buffer overflows: Attacks and defenses for the vulnerability of the decade, DARPA Information Survivability Conference and Exposition. Janvier, 2000.

C. Saurel, Towards a formalization of availability and denialof service, Information Systems Technology Panel Symposium on Protecting Nato Information Systems in the 21st Century, 1999.

M. Dacier, Vers une Evaluation Quantitative de la Sécurité Informatique, Thèse de l'Institut National Polytechnique de Toulouse, 1994.

M. Dacier and A. Wespi, Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem Refrence audit information generation for intrusion detection systems, Third European Symposium on Research in Computer Security, Brington Proc. IFIPSec 98, 1994.

]. D. Denning, An intrusion-detection model, IEEE Symposium on Security and Privacy, 1986.

. Deswarte, Intrusion tolerance in distributed computing systems, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991.
DOI : 10.1109/RISP.1991.130780

. Deswarte, Diversity against accidental and deliberate faults Computer Security, Dependability, & Assurance: from needs to solutions, IEEE Computer Society, 1999.

V. Abghour, D. Nicomette, and . Powell, An Intrusion- Tolerant Authorization Scheme for Internet Applications, Internationnal Conference on Dependable Systems &Networks (DSN'2002). Workshop on Intrusion Tolerant Systems, pp.1-1, 2002.

E. L. Deswarte and . Mé, La sécurité des systèmes d'information et de communication, Sécurité des réseaux et des systèmes répartis Traité IC2, pp.2-7462, 2003.

. Deswarte, Remote Integrity Checking, Working Conference on Integrity and Internal Control in Information Systems (IICIS'2003), 2003.
DOI : 10.1007/1-4020-7901-X_1

. Fabre, An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributed systems, Proc. European Symposium in Computer Security (ESORICS'92), pp.193-208, 1992.
DOI : 10.1007/BFb0013899

M. Fisher, N. Lynch, and . Paterson, Impossibility of Distributed Consensus with one Faulty Process, Journal of the ACM, 1985.

J. D. Fraga and D. Powell, A Fault and Intrusion-Tolerant File System Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering, 3rd International Congress on Computer Security Proc. IEEE. Symposium on Security and Privacy, 1985.

. Harrison, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

. Jones, A Linear time algorithm for deciding security, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976), 1976.
DOI : 10.1109/SFCS.1976.1

. Kim, The design and implementation of tripwire, Proceedings of the 2nd ACM Conference on Computer and communications security , CCS '94, 1993.
DOI : 10.1145/191177.191183

. Koga, Error Recoverable and Securable Data Communication for Computer Networks, Proc. of the 12th Symposium on Fault-Tolerant Computing (FTCS-12), pp.183-186, 1982.

L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981.
DOI : 10.1145/358790.358797

B. W. Lampson, Protection, Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems, 1971.
DOI : 10.1145/775265.775268

E. Carl, . Landwehr, R. Alan, . Bull, P. John et al., A Taxonomy of Computer Program Security Flaws, with Examples, ACM Computing Surveys, 1994.

J. C. Laprie, S??ret?? de fonctionnement des syst??mes : concepts de base et terminologie, Revue de l'Electricit?? et de l'Electronique, vol.-, issue.10, 2004.
DOI : 10.3845/ree.2004.109

J. Deswarte, H. Fabre, M. Guillermain, C. Kaaniche, D. Mazet et al., Guide de la Sûreté de FonctionnementCombining monitors for run-time system verification, Electronic Notes in Theoretical Computer Science, p.2, 2002.

. Luenam, The Design of an Adaptative Intrusion Tolerant Database Server, IEEE workshop on Intrusion Tolerant Systems, 2002.

N. F. Neves and P. Verissimo, Complete Specification of APIs and Protocols for the MAFTIA Middleware, Conceptual Model and Architectureof MAFTIA, 2002.

I. Welch, J. Warne, P. Ryan, and R. Stroud, Architectural Analysis of MAFTIA's Intrusion Tolerance CapabilitiesLa détection d'intrusion : les outils doivent coopérer, Z. Marrakchi, C. Michel, H. Debar et F. Cuppens, 2001.

]. J. Millen, A resource allocation model for denial of service, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992.
DOI : 10.1109/RISP.1992.213265

. Neumann, Experience with EMERALD to Date, First USENIX Workshop on Intrusion Detection and Network Monitoring, 1999.

]. D. Norman-83 and . Norman, Design rules based on analyses of human error, Communications of the ACM, vol.26, issue.4, pp.254-258, 1983.
DOI : 10.1145/2163.358092

D. B. Parker, Restating the foundation of information security, Proceedings of the Eighth International Conference on Information Security, 1992.
DOI : 10.1016/0960-2593(91)90013-Y

J. Pescatore, High-Profile Thefts Show Insiders Do the Most Damage Gartner Inc. http://www.waveset.com/Features Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance, Journal of the ACM, vol.36, issue.2, pp.335-348, 1989.

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

M. Roesch and B. Rothstein, Majority Algorithm Solution An intrusion tolerant architecture for dynamic content internet servers, ACM Workshop on Survivable and Self-Regenerative Systems, 2003.

R. S. Sandhu, The typed access matrix model, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992.
DOI : 10.1109/RISP.1992.213266

R. S. Sandhu, E. Coyne, H. Freinstein, and C. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

]. E. Totel, Politique d'intégrité multiniveau pour la protection en ligne de tâches critiques, Thèse de l'Institut National Polytechnique, Rapport LAAS N°98533, 1998.

C. Cnam and N. /. Report, Towards Trustworthy Security for Healthcare InformationSystems, 2000.

K. Valdes and . Skinner, Adaptive, Model-Based Monitoring for Cyber Attack Detection, Recent Advances in Intrusion Detection, 1907.
DOI : 10.1007/3-540-39945-3_6

S. Almgren, Y. Cheung, B. Deswarte, J. Dutertre, H. Levy et al., An Adaptative Intrusion-Tolerant Server Architecture, Proc. 10th International Workshop on Security Protocols, 2002.

. Wang, A Scalable Intrusion Tolerance Achitecture for Distributed Server, IEEE 2nd SMC Information Assurance Workshop, 2001.