Dependable Computing for Critical Applications 4
This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February...
Other Authors: | , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Vienna
Springer Vienna
1995, 1995
|
Edition: | 1st ed. 1995 |
Series: | Dependable Computing and Fault-Tolerant Systems
|
Subjects: | |
Online Access: | |
Collection: | Springer Book Archives -2004 - Collection details see MPG.ReNa |
Table of Contents:
- Formal Methods for Critical Systems
- On Doubly Guarded Multiprocessor Control System Design
- Using Data Consistency Assumptions to Show System Safety
- Panel Session: Formal Methods for Safety in Critical Systems
- Are Formal Methods Ready for Dependable Systems?
- Industrial Use of Formal Methods
- Formal Methods for Safety in Critical Systems
- Can We Rely on Formal Methods?
- A Role for Formal Methodists
- Combining the Fault-Tolerance, Security and Real-Time Aspects of Computing
- Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler
- Fault-Detecting Network Membership Protocols for Unknown Topologies
- Secure Systems
- Denial of Service: A Perspective
- Reasoning About Message Integrity
- On the Security Effectiveness of Cryptographic Protocols
- Assessment of Dependability
- Assessing the Dependability of Embedded Software Sytems Using the Dynamic Flowgraph Methodology
- On Managing Fault-Tolerant Design Risks
- Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data
- Panel Session: Common Techniques in Fault-Tolerance and Security
- Common Techniques in Fault-Tolerance and Security
- Improving Security by Fault-Tolerance
- The Need for A Failure Model for Security
- Reliability and Security
- Fault Tolerance and Security
- Common Techniques in Fault Tolerance and Security (and Performance!)
- Real-Time Systems
- Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs
- Scheduling Fault Recovery Operations for Time-Critical Applications
- Evaluation of Dependability Aspects
- Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques
- System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures
- Improving Availability Bounds Using the Failure Distance Concept
- Panel Session: Quantitative versus Quantitative Aspects of Security
- Qualitative vs. Quantitative Assessment of Security: A Panel Discussion
- A Fault Forecasting Approach for Operational Security Monitoring
- Measurement of Operational Security
- Quantitative Measures of Security
- The Feasibility of Quantitative Assessment of Security
- Quantitative Measures vs. Countermeasures
- Basic Problems in Distributed Fault-Tolerant Systems
- Continual On-Line Diagnosis of Hybrid Faults
- The General Convergence Problem: A Unification of Synchronous Systems
- Specification and Verification of Distributed Protocols
- Specification and Verification of Behavioral Patterns in Distributed Computations
- Specification and Verification of an Atomic Broadcast Protocol
- Trace-Based Compositional Refinement of Fault-Tolerant Distributed Systems
- Design Techniques for Robustness
- A Modular Robust Binary Tree