This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on computer systems for critical applications? This conference, like its predecessors, addressed various aspects of dependability, a broad term defined as the…mehr
This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on computer systems for critical applications? This conference, like its predecessors, addressed various aspects of dependability, a broad term defined as the degree of trust that may justifiably be placed in a system's reliability, availability, safety, security and performance. Because of its broad scope, a main goal was to contribute to a unified understanding and integration of these concepts. The Program Committee selected 21 papers for presentation from a total of 95 submissions at a September meeting in Menlo Park, California. The resultingprogram represents a broad spectrum of interests, with papers from universities, corporations and government agencies in eight countries. The selection process was greatly facilitated by the diligent work of the program committee members, for which we are most grateful. As a Working Conference, the program was designed to promote the exchange of ideas by extensive discussions. All paper sessions ended with a 30 minute discussion period on the topics covered by the session. In addition, three panel sessions have been organizcd.
Produktdetails
Produktdetails
Dependable Computing and Fault-Tolerant Systems .9
Artikelnr. des Verlages: 86035408, 978-3-7091-9398-3
Softcover reprint of the original 1st ed. 1995
Seitenzahl: 520
Erscheinungstermin: 12. Februar 2012
Englisch
Abmessung: 244mm x 170mm x 28mm
Gewicht: 888g
ISBN-13: 9783709193983
ISBN-10: 3709193982
Artikelnr.: 39509083
Inhaltsangabe
Formal Methods for Critical Systems.- On Doubly Guarded Multiprocessor Control System Design.- Using Data Consistency Assumptions to Show System Safety.- Panel Session: Formal Methods for Safety in Critical Systems.- Are Formal Methods Ready for Dependable Systems?.- Industrial Use of Formal Methods.- Formal Methods for Safety in Critical Systems.- Can We Rely on Formal Methods?.- A Role for Formal Methodists.- Combining the Fault-Tolerance, Security and Real-Time Aspects of Computing.- Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler.- Fault-Detecting Network Membership Protocols for Unknown Topologies.- Secure Systems.- Denial of Service: A Perspective.- Reasoning About Message Integrity.- On the Security Effectiveness of Cryptographic Protocols.- Assessment of Dependability.- Assessing the Dependability of Embedded Software Sytems Using the Dynamic Flowgraph Methodology.- On Managing Fault-Tolerant Design Risks.- Panel Session: Quantitative versus Quantitative Aspects of Security.- Qualitative vs. Quantitative Assessment of Security: A Panel Discussion.- A Fault Forecasting Approach for Operational Security Monitoring.- Measurement of Operational Security.- Quantitative Measures of Security.- The Feasibility of Quantitative Assessment of Security.- Quantitative Measures vs. Countermeasures.- Basic Problems in Distributed Fault-Tolerant Systems.- Continual On-Line Diagnosis of Hybrid Faults.- The General Convergence Problem: A Unification of Synchronous Systems.- Specification and Verification of Distributed Protocols.- Specification and Verification of Behavioral Patterns in Distributed Computations.- Specification and Verification of an Atomic Broadcast Protocol.- Trace-Based Compositional Refinement of Fault-Tolerant Distributed Systems.- Design Techniques for Robustness.- A Modular Robust Binary Tree.- Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data.- Panel Session: Common Techniques in Fault-Tolerance and Security.- Common Techniques in Fault-Tolerance and Security.- Improving Security by Fault-Tolerance.- The Need for A Failure Model for Security.- Reliability and Security.- Fault Tolerance and Security.- Common Techniques in Fault Tolerance and Security (and Performance!).- Real-Time Systems.- Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs.- Scheduling Fault Recovery Operations for Time-Critical Applications.- Evaluation of Dependability Aspects.- Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques.- System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures.- Improving Availability Bounds Using the Failure Distance Concept.
Formal Methods for Critical Systems.- On Doubly Guarded Multiprocessor Control System Design.- Using Data Consistency Assumptions to Show System Safety.- Panel Session: Formal Methods for Safety in Critical Systems.- Are Formal Methods Ready for Dependable Systems?.- Industrial Use of Formal Methods.- Formal Methods for Safety in Critical Systems.- Can We Rely on Formal Methods?.- A Role for Formal Methodists.- Combining the Fault-Tolerance, Security and Real-Time Aspects of Computing.- Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler.- Fault-Detecting Network Membership Protocols for Unknown Topologies.- Secure Systems.- Denial of Service: A Perspective.- Reasoning About Message Integrity.- On the Security Effectiveness of Cryptographic Protocols.- Assessment of Dependability.- Assessing the Dependability of Embedded Software Sytems Using the Dynamic Flowgraph Methodology.- On Managing Fault-Tolerant Design Risks.- Panel Session: Quantitative versus Quantitative Aspects of Security.- Qualitative vs. Quantitative Assessment of Security: A Panel Discussion.- A Fault Forecasting Approach for Operational Security Monitoring.- Measurement of Operational Security.- Quantitative Measures of Security.- The Feasibility of Quantitative Assessment of Security.- Quantitative Measures vs. Countermeasures.- Basic Problems in Distributed Fault-Tolerant Systems.- Continual On-Line Diagnosis of Hybrid Faults.- The General Convergence Problem: A Unification of Synchronous Systems.- Specification and Verification of Distributed Protocols.- Specification and Verification of Behavioral Patterns in Distributed Computations.- Specification and Verification of an Atomic Broadcast Protocol.- Trace-Based Compositional Refinement of Fault-Tolerant Distributed Systems.- Design Techniques for Robustness.- A Modular Robust Binary Tree.- Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data.- Panel Session: Common Techniques in Fault-Tolerance and Security.- Common Techniques in Fault-Tolerance and Security.- Improving Security by Fault-Tolerance.- The Need for A Failure Model for Security.- Reliability and Security.- Fault Tolerance and Security.- Common Techniques in Fault Tolerance and Security (and Performance!).- Real-Time Systems.- Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs.- Scheduling Fault Recovery Operations for Time-Critical Applications.- Evaluation of Dependability Aspects.- Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques.- System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures.- Improving Availability Bounds Using the Failure Distance Concept.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497