Paul Rubel

Former group member (MS, 2000).
LinkedIn profile

Publications with the Performability Engineering Research Group

Proteus: A Flexible Infrastructure to Implement Adaptive Fault Tolerance in AQuA.
C. Sabnis, M. Cukier, J. Ren, P. Rubel, W. H. Sanders, D. E. Bakken, and D. A. Karr. (98SAB02)
in C. B. Weinstock and J. Rushby (Eds.), Dependable Computing for Critical Applications 7, vol. 12 in series Dependable Computing and Fault-Tolerant Systems (A. Avizienis, H. Kopetz, and J. C. Laprie, Eds.), pp. 149-168. Los Alamitos, CA: IEEE Computer Society, 1999. [IEEE Xplore entry]

Building Dependable Distributed Objects with the AQuA Architecture.
M. Cukier, J. Ren, P. Rubel, D. E. Bakken, and D. A. Karr. (99CUK02)
Digest of FastAbstracts presented at the 29th Annual International Symposium on Fault-Tolerant Computing (FTCS-29), Madison, Wisconsin, USA, June 15-18, 1999, pp. 17-18.

Building Dependable Distributed Applications Using AQuA.
J. Ren, M. Cukier, P. Rubel, W. H. Sanders, D. E. Bakken, and D. A. Karr. (99CUK03)
Proceedings of the 4th IEEE Symposium on High Assurance Systems Engineering (HASE’99), Washington D.C., November 17-19, 1999, pp. 189-196. [IEEE Xplore entry]

Passive Replication in the AQuA System.
P. G. Rubel. (00RUB01)
Master’s Thesis, University of Illinois, 2000.

Providing Intrusion Tolerance with ITUA.
T. Courtney, J. Lyons, H. V. Ramasamy, W. H. Sanders, M. Seri, M. Atighetchi, P. Rubel, C. Jones, F. Webber, P. Pal, R. Watro, M. Cukier, and J. Gossett. (02COU01)
Supplemental Volume of the 2002 International Conference on Dependable Systems & Networks (DSN-2002), Washington, DC, June 23-26, 2002, pp. C-5-1 to C-5-3.

Passive Replication Schemes in AQuA.
Y. (J.) Ren, P. Rubel, M. Seri, M. Cukier, W. H. Sanders, and T. Courtney. (02REN01)
Proceedings of the 2002 Pacific Rim International Symposium on Dependable Computing (PRDC 2002), Tsukuba, Japan, December 16-18, 2002, pp. 125-130. [IEEE Xplore entry]

AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects.
Y. (J.) Ren, D. E. Bakken, T. Courtney, M. Cukier, D. A. Karr, P. Rubel, C. Sabnis, W. H. Sanders, R. E. Schantz, and M. Seri. (99CUK04)
IEEE Transactions on Computers, vol. 52, no. 1, January 2003, pp. 31-50. [IEEE Xplore entry]

Generating Policies for Defense in Depth.
P. Rubel, M. Ihde, S. Harp, and C. Payne. (05RUB01)
Proceedings of the 21st Annual Computer Security Applications Conference, Tucson, Arizona, December 5-9, 2005, pp. 505-514. [IEEE Xplore entry]

An Architecture for Adaptive Intrusion-Tolerant Applications.
P. Pal, P. Rubel, M. Atighetchi, F. Webber, W. H. Sanders, M. Seri, H. Ramasamy, J. Lyons, T. Courtney, A. Agbaria, M. Cukier, J. Gossett, and I. Keidar. (04PAL01)
Special issue of Software: Practice and Experience on Experiences with Auto-adaptive and Reconfigurable Systems, vol. 36, no. 11-12, September-October 2006, pp. 1331-1354.


COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”

With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.