Building intrusion tolerant applications | IEEE Conference Publication | IEEE Xplore