Dependable Computing for Critical Applications 4

This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February...

Full description

Bibliographic Details
Other Authors: Cristian, Flaviu (Editor), LeLann, Gerard (Editor), Lunt, Teresa (Editor)
Format: eBook
Language:English
Published: Vienna Springer Vienna 1995, 1995
Edition:1st ed. 1995
Series:Dependable Computing and Fault-Tolerant Systems
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 05692nmm a2200397 u 4500
001 EB000709459
003 EBX01000000000000000562541
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9783709193969 
100 1 |a Cristian, Flaviu  |e [editor] 
245 0 0 |a Dependable Computing for Critical Applications 4  |h Elektronische Ressource  |c edited by Flaviu Cristian, Gerard LeLann, Teresa Lunt 
250 |a 1st ed. 1995 
260 |a Vienna  |b Springer Vienna  |c 1995, 1995 
300 |a VIII, 499 p  |b online resource 
505 0 |a Formal Methods for Critical Systems -- On Doubly Guarded Multiprocessor Control System Design -- Using Data Consistency Assumptions to Show System Safety -- Panel Session: Formal Methods for Safety in Critical Systems -- Are Formal Methods Ready for Dependable Systems? -- Industrial Use of Formal Methods -- Formal Methods for Safety in Critical Systems -- Can We Rely on Formal Methods? -- A Role for Formal Methodists -- Combining the Fault-Tolerance, Security and Real-Time Aspects of Computing -- Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler -- Fault-Detecting Network Membership Protocols for Unknown Topologies -- Secure Systems -- Denial of Service: A Perspective -- Reasoning About Message Integrity -- On the Security Effectiveness of Cryptographic Protocols -- Assessment of Dependability -- Assessing the Dependability of Embedded Software Sytems Using the Dynamic Flowgraph Methodology -- On Managing Fault-Tolerant Design Risks --  
505 0 |a Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data -- Panel Session: Common Techniques in Fault-Tolerance and Security -- Common Techniques in Fault-Tolerance and Security -- Improving Security by Fault-Tolerance -- The Need for A Failure Model for Security -- Reliability and Security -- Fault Tolerance and Security -- Common Techniques in Fault Tolerance and Security (and Performance!) -- Real-Time Systems -- Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs -- Scheduling Fault Recovery Operations for Time-Critical Applications -- Evaluation of Dependability Aspects -- Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques -- System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures -- Improving Availability Bounds Using the Failure Distance Concept 
505 0 |a Panel Session: Quantitative versus Quantitative Aspects of Security -- Qualitative vs. Quantitative Assessment of Security: A Panel Discussion -- A Fault Forecasting Approach for Operational Security Monitoring -- Measurement of Operational Security -- Quantitative Measures of Security -- The Feasibility of Quantitative Assessment of Security -- Quantitative Measures vs. Countermeasures -- Basic Problems in Distributed Fault-Tolerant Systems -- Continual On-Line Diagnosis of Hybrid Faults -- The General Convergence Problem: A Unification of Synchronous Systems -- Specification and Verification of Distributed Protocols -- Specification and Verification of Behavioral Patterns in Distributed Computations -- Specification and Verification of an Atomic Broadcast Protocol -- Trace-Based Compositional Refinement of Fault-Tolerant Distributed Systems -- Design Techniques for Robustness -- A Modular Robust Binary Tree --  
653 |a Software engineering 
653 |a Automotive Engineering 
653 |a Artificial Intelligence 
653 |a Software Engineering 
653 |a Automotive engineering 
653 |a Artificial intelligence 
653 |a Special Purpose and Application-Based Systems 
653 |a Computers, Special purpose 
700 1 |a LeLann, Gerard  |e [editor] 
700 1 |a Lunt, Teresa  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Dependable Computing and Fault-Tolerant Systems 
028 5 0 |a 10.1007/978-3-7091-9396-9 
856 4 0 |u https://doi.org/10.1007/978-3-7091-9396-9?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004 
520 |a This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on computer systems for critical applications? This conference, like its predecessors, addressed various aspects of dependability, a broad term defined as the degree of trust that may justifiably be placed in a system's reliability, availability, safety, security and performance. Because of its broad scope, a main goal was to contribute to a unified understanding and integration of these concepts. The Program Committee selected 21 papers for presentation from a total of 95 submissions at a September meeting in Menlo Park, California. The resulting program represents a broad spectrum of interests, with papers from universities, corporations and government agencies in eight countries. The selection process was greatly facilitated by the diligent work of the program committee members, for which we are most grateful. As a Working Conference, the program was designed to promote the exchange of ideas by extensive discussions. All paper sessions ended with a 30 minute discussion period on the topics covered by the session. In addition, three panel sessions have been organizcd