Bibliographic Information

Dependable computing for critical applications

A. Avižienis, J.C. Laprie, editors

(Dependable computing and fault-tolerant systems, vol. 4, 6, 8-9)

Springer-Verlag, c1991-1995

  • [1] : au
  • [1] : us
  • 2 : au
  • 2 : us
  • 3 : au
  • 3 : us
  • 4

Available at  / 12 libraries

Search this Book/Journal

Note

v.2-J.F. Meyer, R.D. Schlichting, editors

v.3-C.E. Landwehr, B. Randell, L. Simoncini, editors

v.4-F. Cristian, G. Le Lann, T. Lunt, editors

Includes bibliographical references and index

Description and Table of Contents

Volume

[1] : au ISBN 9783211822494

Description

The proceedings of the IFIP Working Conference on Dependable Computing for Critical Applications contain an excellent review of the state of the art and novel developments in this important field. The twenty carefully selected papers have been extensively discussed by about one hundred international experts at the three day working conference in Santa Baraba, California. The varied backgrounds of the participants from academia, industry and research institutions from 13 countries and the unusual mix of conceptual and experimental presentations, gave rise to interesting and thought provoking discussions with the authors. Based on these discussions, the papers have been enhanced and revised and now appear in this unique hardbound volume, covering the following topics: Architectural Issues in Dependable Distributed Systems, Modelling and Validation, Assessment of Design Diversity, Design for Security and Fault Tolerance, Experimental Evaluation of Fault-Tolerance, Dependability of Railway Signaling Systems, Digital Computers Abord Airplanes, and many more. This book should be of interest to anyone who is involved in the design, development or maintenance of sophisticated computer systems for applications, where dependability concerns, such as reliability, safety, or security, are of major significance.
Volume

2 : au ISBN 9783211823309

Description

This book contains the twenty papers presented and discussed at the 2nd IFIP Working Conference on Depend- able Computing for Critical Applications. Based on the feedback at this meeting, the papers were revised and updated prior to inclusion in this volume. The topics addressed span the spectrum of dependable computing, from design methods for distributed, fault-tolerant systems to formal and experimental validation techniques. The unique focus of this forum on critical applications is what distinguishes many of these papers from those found elsewhere. This book should be of interest to those involved in the development of computing systems where dependability attributes such as reliability, safety, and security are a major concern.
Volume

3 : au ISBN 9783211824818

Description

This volume contains the papers presented at the 3rd IFIP Working Conference on Dependable Computing for Critical Applications. The topics addressed span the spectrum of dependable computing, from design methods for distributed, fault-tolerant systems to formal and experimental validation techniques. This book should interest individuals involved in the development of computing systems where dependability attributes such as reliability, safety, and security are a major concern.
Volume

4 ISBN 9783211826492

Description

This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on computer systems for critical applications? This conference, like its predecessors, addressed various aspects of dependability, a broad term defined as the degree of trust that may justifiably be placed in a system's reliability, availability, safety, security and performance. Because of its broad scope, a main goal was to contribute to a unified understanding and integration of these concepts. The Program Committee selected 21 papers for presentation from a total of 95 submissions at a September meeting in Menlo Park, California. The resulting program represents a broad spectrum of interests, with papers from universities, corporations and government agencies in eight countries. The selection process was greatly facilitated by the diligent work of the program committee members, for which we are most grateful. As a Working Conference, the program was designed to promote the exchange of ideas by extensive discussions. All paper sessions ended with a 30 minute discussion period on the topics covered by the session. In addition, three panel sessions have been organizcd.

Table of Contents

Formal Methods for Critical Systems.- On Doubly Guarded Multiprocessor Control System Design.- Using Data Consistency Assumptions to Show System Safety.- Panel Session: Formal Methods for Safety in Critical Systems.- Are Formal Methods Ready for Dependable Systems?.- Industrial Use of Formal Methods.- Formal Methods for Safety in Critical Systems.- Can We Rely on Formal Methods?.- A Role for Formal Methodists.- Combining the Fault-Tolerance, Security and Real-Time Aspects of Computing.- Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler.- Fault-Detecting Network Membership Protocols for Unknown Topologies.- Secure Systems.- Denial of Service: A Perspective.- Reasoning About Message Integrity.- On the Security Effectiveness of Cryptographic Protocols.- Assessment of Dependability.- Assessing the Dependability of Embedded Software Sytems Using the Dynamic Flowgraph Methodology.- On Managing Fault-Tolerant Design Risks.- Panel Session: Quantitative versus Quantitative Aspects of Security.- Qualitative vs. Quantitative Assessment of Security: A Panel Discussion.- A Fault Forecasting Approach for Operational Security Monitoring.- Measurement of Operational Security.- Quantitative Measures of Security.- The Feasibility of Quantitative Assessment of Security.- Quantitative Measures vs. Countermeasures.- Basic Problems in Distributed Fault-Tolerant Systems.- Continual On-Line Diagnosis of Hybrid Faults.- The General Convergence Problem: A Unification of Synchronous Systems.- Specification and Verification of Distributed Protocols.- Specification and Verification of Behavioral Patterns in Distributed Computations.- Specification and Verification of an Atomic Broadcast Protocol.- Trace-Based Compositional Refinement of Fault-Tolerant Distributed Systems.- Design Techniques for Robustness.- A Modular Robust Binary Tree.- Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data.- Panel Session: Common Techniques in Fault-Tolerance and Security.- Common Techniques in Fault-Tolerance and Security.- Improving Security by Fault-Tolerance.- The Need for A Failure Model for Security.- Reliability and Security.- Fault Tolerance and Security.- Common Techniques in Fault Tolerance and Security (and Performance!).- Real-Time Systems.- Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs.- Scheduling Fault Recovery Operations for Time-Critical Applications.- Evaluation of Dependability Aspects.- Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques.- System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures.- Improving Availability Bounds Using the Failure Distance Concept.

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

  • NCID
    BA12759017
  • ISBN
    • 3211822496
    • 0387822496
    • 3211823301
    • 0387823301
    • 3211824812
    • 0387824812
    • 3211826491
  • LCCN
    90028509
  • Country Code
    au
  • Title Language Code
    eng
  • Text Language Code
    eng
  • Place of Publication
    Wien ; New York
  • Pages/Volumes
    v.
  • Size
    25 cm
  • Classification
  • Subject Headings
  • Parent Bibliography ID
Page Top