Foundations of Intrusion Tolerant Systems