About the Event
A trustworthy service must tolerate attacks and failures. Replication,
the standard approach for implementing integrity and availability, is
inconsistent with preserving confidentiality; and independence
assumptions for replicas become questionable in the presence of attacks.
In this talk, current research directed at bridging these gaps will be discussed.