Ebook: Dependable Computing for Critical Applications 4
- Tags: Special Purpose and Application-Based Systems, Automotive Engineering, Software Engineering, Computing Methodologies
- Series: Dependable Computing and Fault-Tolerant Systems 9
- Year: 1995
- Publisher: Springer-Verlag Wien
- Edition: 1
- Language: English
- pdf
This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on computer systems for critical applications? This conference, like its predecessors, addressed various aspects of dependability, a broad term defined as the degree of trust that may justifiably be placed in a system's reliability, availability, safety, security and performance. Because of its broad scope, a main goal was to contribute to a unified understanding and integration of these concepts. The Program Committee selected 21 papers for presentation from a total of 95 submissions at a September meeting in Menlo Park, California. The resulting program represents a broad spectrum of interests, with papers from universities, corporations and government agencies in eight countries. The selection process was greatly facilitated by the diligent work of the program committee members, for which we are most grateful. As a Working Conference, the program was designed to promote the exchange of ideas by extensive discussions. All paper sessions ended with a 30 minute discussion period on the topics covered by the session. In addition, three panel sessions have been organizcd.
Content:
Front Matter....Pages I-XIII
Front Matter....Pages 1-1
On Doubly Guarded Multiprocessor Control System Design....Pages 3-13
Using Data Consistency Assumptions to Show System Safety....Pages 15-27
Front Matter....Pages 29-29
Formal Methods Panel: Are Formal Methods Ready for Dependable Systems?....Pages 31-32
Industrial Use of Formal Methods....Pages 33-35
Formal Methods for Safety in Critical Systems....Pages 37-39
Can we rely on Formal Methods?....Pages 41-42
A Role for Formal Methodists....Pages 43-45
Front Matter....Pages 47-47
Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler....Pages 49-68
Fault-Detecting Network Membership Protocols for Unknown Topologies....Pages 69-90
Front Matter....Pages 91-91
Denial of Service: A Perspective....Pages 93-108
Reasoning about Message Integrity....Pages 109-137
On the Security Effectiveness of Cryptographic Protocols....Pages 139-157
Front Matter....Pages 159-159
Assessing the Dependability of Embedded Software Systems Using the Dynamic Flowgraph Methodology....Pages 161-184
On Managing Fault-Tolerant Design Risks....Pages 185-207
Front Matter....Pages 209-209
Qualitative vs. Quantitative Assessment of Security: A Panel Discussion....Pages 211-213
A Fault Forecasting Approach for Operational Security Monitoring....Pages 215-217
Measurement of Operational Security....Pages 219-221
Quantitative Measures of Security....Pages 223-226
The Feasibility of Quantitative Assessment of Security....Pages 227-228
Quantitative Measures vs. Countermeasures....Pages 229-230
Front Matter....Pages 231-231
Continual On-Line Diagnosis of Hybrid Faults....Pages 233-249
The General Convergence Problem: A Unification of Synchronous and Asynchronous Systems....Pages 251-267
Front Matter....Pages 269-269
Specification and Verification of Behavioral Patterns in Distributed Computations....Pages 271-289
Specification and Verification of an Atomic Broadcast Protocol....Pages 291-308
Trace-Based Compositional Refinement of Fault Tolerant Distributed Systems....Pages 309-324
Front Matter....Pages 325-325
A Modular Robust Binary Tree....Pages 327-347
Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data....Pages 349-369
Front Matter....Pages 371-371
Common Techniques Panel: Common Techniques in Fault-Tolerance and Security....Pages 373-377
Improving Security by Fault Tolerance....Pages 379-381
The Need for a Failure Model for Security....Pages 383-385
Reliability and Security....Pages 387-388
Fault Tolerance and Security....Pages 389-391
Common Techniques in Fault Tolerance and Security (and Performance!)....Pages 393-395
Front Matter....Pages 397-397
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs....Pages 399-409
Scheduling Fault Recovery Operations for Time-Critical Applications....Pages 411-432
Front Matter....Pages 433-433
Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques....Pages 435-457
System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures....Pages 459-477
Improving Availability Bounds using the Failure Distance Concept....Pages 479-497
Back Matter....Pages 499-502
Content:
Front Matter....Pages I-XIII
Front Matter....Pages 1-1
On Doubly Guarded Multiprocessor Control System Design....Pages 3-13
Using Data Consistency Assumptions to Show System Safety....Pages 15-27
Front Matter....Pages 29-29
Formal Methods Panel: Are Formal Methods Ready for Dependable Systems?....Pages 31-32
Industrial Use of Formal Methods....Pages 33-35
Formal Methods for Safety in Critical Systems....Pages 37-39
Can we rely on Formal Methods?....Pages 41-42
A Role for Formal Methodists....Pages 43-45
Front Matter....Pages 47-47
Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler....Pages 49-68
Fault-Detecting Network Membership Protocols for Unknown Topologies....Pages 69-90
Front Matter....Pages 91-91
Denial of Service: A Perspective....Pages 93-108
Reasoning about Message Integrity....Pages 109-137
On the Security Effectiveness of Cryptographic Protocols....Pages 139-157
Front Matter....Pages 159-159
Assessing the Dependability of Embedded Software Systems Using the Dynamic Flowgraph Methodology....Pages 161-184
On Managing Fault-Tolerant Design Risks....Pages 185-207
Front Matter....Pages 209-209
Qualitative vs. Quantitative Assessment of Security: A Panel Discussion....Pages 211-213
A Fault Forecasting Approach for Operational Security Monitoring....Pages 215-217
Measurement of Operational Security....Pages 219-221
Quantitative Measures of Security....Pages 223-226
The Feasibility of Quantitative Assessment of Security....Pages 227-228
Quantitative Measures vs. Countermeasures....Pages 229-230
Front Matter....Pages 231-231
Continual On-Line Diagnosis of Hybrid Faults....Pages 233-249
The General Convergence Problem: A Unification of Synchronous and Asynchronous Systems....Pages 251-267
Front Matter....Pages 269-269
Specification and Verification of Behavioral Patterns in Distributed Computations....Pages 271-289
Specification and Verification of an Atomic Broadcast Protocol....Pages 291-308
Trace-Based Compositional Refinement of Fault Tolerant Distributed Systems....Pages 309-324
Front Matter....Pages 325-325
A Modular Robust Binary Tree....Pages 327-347
Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data....Pages 349-369
Front Matter....Pages 371-371
Common Techniques Panel: Common Techniques in Fault-Tolerance and Security....Pages 373-377
Improving Security by Fault Tolerance....Pages 379-381
The Need for a Failure Model for Security....Pages 383-385
Reliability and Security....Pages 387-388
Fault Tolerance and Security....Pages 389-391
Common Techniques in Fault Tolerance and Security (and Performance!)....Pages 393-395
Front Matter....Pages 397-397
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs....Pages 399-409
Scheduling Fault Recovery Operations for Time-Critical Applications....Pages 411-432
Front Matter....Pages 433-433
Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques....Pages 435-457
System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures....Pages 459-477
Improving Availability Bounds using the Failure Distance Concept....Pages 479-497
Back Matter....Pages 499-502
....