𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Dependable Computing for Critical Applications 4

✍ Scribed by WΕ‚adysΕ‚aw M. Turski (auth.), Prof. Flaviu Cristian, Gerard Le Lann, Teresa Lunt (eds.)


Publisher
Springer-Verlag Wien
Year
1995
Tongue
English
Leaves
478
Series
Dependable Computing and Fault-Tolerant Systems 9
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on computer systems for critical applications? This conference, like its predecessors, addressed various aspects of dependability, a broad term defined as the degree of trust that may justifiably be placed in a system's reliability, availability, safety, security and performance. Because of its broad scope, a main goal was to contribute to a unified understanding and integration of these concepts. The Program Committee selected 21 papers for presentation from a total of 95 submissions at a September meeting in Menlo Park, California. The resulting program represents a broad spectrum of interests, with papers from universities, corporations and government agencies in eight countries. The selection process was greatly facilitated by the diligent work of the program committee members, for which we are most grateful. As a Working Conference, the program was designed to promote the exchange of ideas by extensive discussions. All paper sessions ended with a 30 minute discussion period on the topics covered by the session. In addition, three panel sessions have been organizcd.

✦ Table of Contents


Front Matter....Pages I-XIII
Front Matter....Pages 1-1
On Doubly Guarded Multiprocessor Control System Design....Pages 3-13
Using Data Consistency Assumptions to Show System Safety....Pages 15-27
Front Matter....Pages 29-29
Formal Methods Panel: Are Formal Methods Ready for Dependable Systems?....Pages 31-32
Industrial Use of Formal Methods....Pages 33-35
Formal Methods for Safety in Critical Systems....Pages 37-39
Can we rely on Formal Methods?....Pages 41-42
A Role for Formal Methodists....Pages 43-45
Front Matter....Pages 47-47
Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler....Pages 49-68
Fault-Detecting Network Membership Protocols for Unknown Topologies....Pages 69-90
Front Matter....Pages 91-91
Denial of Service: A Perspective....Pages 93-108
Reasoning about Message Integrity....Pages 109-137
On the Security Effectiveness of Cryptographic Protocols....Pages 139-157
Front Matter....Pages 159-159
Assessing the Dependability of Embedded Software Systems Using the Dynamic Flowgraph Methodology....Pages 161-184
On Managing Fault-Tolerant Design Risks....Pages 185-207
Front Matter....Pages 209-209
Qualitative vs. Quantitative Assessment of Security: A Panel Discussion....Pages 211-213
A Fault Forecasting Approach for Operational Security Monitoring....Pages 215-217
Measurement of Operational Security....Pages 219-221
Quantitative Measures of Security....Pages 223-226
The Feasibility of Quantitative Assessment of Security....Pages 227-228
Quantitative Measures vs. Countermeasures....Pages 229-230
Front Matter....Pages 231-231
Continual On-Line Diagnosis of Hybrid Faults....Pages 233-249
The General Convergence Problem: A Unification of Synchronous and Asynchronous Systems....Pages 251-267
Front Matter....Pages 269-269
Specification and Verification of Behavioral Patterns in Distributed Computations....Pages 271-289
Specification and Verification of an Atomic Broadcast Protocol....Pages 291-308
Trace-Based Compositional Refinement of Fault Tolerant Distributed Systems....Pages 309-324
Front Matter....Pages 325-325
A Modular Robust Binary Tree....Pages 327-347
Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data....Pages 349-369
Front Matter....Pages 371-371
Common Techniques Panel: Common Techniques in Fault-Tolerance and Security....Pages 373-377
Improving Security by Fault Tolerance....Pages 379-381
The Need for a Failure Model for Security....Pages 383-385
Reliability and Security....Pages 387-388
Fault Tolerance and Security....Pages 389-391
Common Techniques in Fault Tolerance and Security (and Performance!)....Pages 393-395
Front Matter....Pages 397-397
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs....Pages 399-409
Scheduling Fault Recovery Operations for Time-Critical Applications....Pages 411-432
Front Matter....Pages 433-433
Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques....Pages 435-457
System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures....Pages 459-477
Improving Availability Bounds using the Failure Distance Concept....Pages 479-497
Back Matter....Pages 499-502

✦ Subjects


Special Purpose and Application-Based Systems; Automotive Engineering; Software Engineering; Computing Methodologies


πŸ“œ SIMILAR VOLUMES


Dependable Computing for Critical Applic
✍ Mel Barnes (auth.), Prof. Dr. Algirdas AviΕΎienis, Dr. Jean-Claude Laprie (eds.) πŸ“‚ Library πŸ“… 1991 πŸ› Springer-Verlag Wien 🌐 English

<p>The International Working Conference on Dependable Computing for Critical Applications was the first conference organized by IFIP Working Group 10. 4 "Dependable Computing and Fault Tolerance", in cooperation with the Technical Committee on Fault-Tolerant Computing of the IEEE Computer Society, a

Dependable Computing for Critical Applic
✍ Sandro Bologna, Øivind Berg, Kjell Haugset, Jon Kvalem (auth.), Prof. John F. Me πŸ“‚ Library πŸ“… 1992 πŸ› Springer-Verlag Wien 🌐 English

<p>This volume contains the papers presented at the Second International WorkΒ­ ing Conference on Dependable Computing for Critical Applications, sponsored by IFIP Working Group lOA and held in Tucson, Arizona on February 18-20, 1991. In keeping with the first such conference on this topic, which too

Dependable Computing for Critical Applic
✍ Pascale ThΓ©venod-Fosse, HΓ©lΓ¨ne Waeselynck (auth.), Dr. Carl E. Landwehr, Prof. D πŸ“‚ Library πŸ“… 1993 πŸ› Springer-Verlag Wien 🌐 English

<p>This volume contains the papers presented. at the Third IFIP International Working Conference on Dependable Computing for Critical Applications, sponsored by IFIP Working Group 10.4 and held in Mondello (Sicily), Italy on September 14-16, 1992. System developers increasingly apply computers where

Foundations of Dependable Computing: Par
✍ Gary M. Koob, Clifford G. Lau πŸ“‚ Library πŸ“… 1994 πŸ› Springer 🌐 English

Foundations of Dependable Computing: Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstrac

Dependable Network Computing
✍ Jean-Claude Laprie (auth.), Dimiter R. Avresky (eds.) πŸ“‚ Library πŸ“… 2000 πŸ› Springer US 🌐 English

<p><em>Dependable Network Computing</em> provides insights into various problems facing millions of global users resulting from the `internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconf

Delta-4: A Generic Architecture for Depe
✍ David Powell (auth.), David Powell (eds.) πŸ“‚ Library πŸ“… 1991 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Delta-4 is a 5-nation, 13-partner project that has been investigating the achievement of dependability in open distributed systems, including real-time systems. This book describes the design and validation of the distributed fault-tolerant architecture developed within this project. The key feat