Dependable Computing for Critical Applications 4

This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February...

Full description

Bibliographic Details
Other Authors: Cristian, Flaviu (Editor), LeLann, Gerard (Editor), Lunt, Teresa (Editor)
Format: eBook
Language:English
Published: Vienna Springer Vienna 1995, 1995
Edition:1st ed. 1995
Series:Dependable Computing and Fault-Tolerant Systems
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • Formal Methods for Critical Systems
  • On Doubly Guarded Multiprocessor Control System Design
  • Using Data Consistency Assumptions to Show System Safety
  • Panel Session: Formal Methods for Safety in Critical Systems
  • Are Formal Methods Ready for Dependable Systems?
  • Industrial Use of Formal Methods
  • Formal Methods for Safety in Critical Systems
  • Can We Rely on Formal Methods?
  • A Role for Formal Methodists
  • Combining the Fault-Tolerance, Security and Real-Time Aspects of Computing
  • Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler
  • Fault-Detecting Network Membership Protocols for Unknown Topologies
  • Secure Systems
  • Denial of Service: A Perspective
  • Reasoning About Message Integrity
  • On the Security Effectiveness of Cryptographic Protocols
  • Assessment of Dependability
  • Assessing the Dependability of Embedded Software Sytems Using the Dynamic Flowgraph Methodology
  • On Managing Fault-Tolerant Design Risks
  • Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data
  • Panel Session: Common Techniques in Fault-Tolerance and Security
  • Common Techniques in Fault-Tolerance and Security
  • Improving Security by Fault-Tolerance
  • The Need for A Failure Model for Security
  • Reliability and Security
  • Fault Tolerance and Security
  • Common Techniques in Fault Tolerance and Security (and Performance!)
  • Real-Time Systems
  • Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs
  • Scheduling Fault Recovery Operations for Time-Critical Applications
  • Evaluation of Dependability Aspects
  • Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques
  • System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures
  • Improving Availability Bounds Using the Failure Distance Concept
  • Panel Session: Quantitative versus Quantitative Aspects of Security
  • Qualitative vs. Quantitative Assessment of Security: A Panel Discussion
  • A Fault Forecasting Approach for Operational Security Monitoring
  • Measurement of Operational Security
  • Quantitative Measures of Security
  • The Feasibility of Quantitative Assessment of Security
  • Quantitative Measures vs. Countermeasures
  • Basic Problems in Distributed Fault-Tolerant Systems
  • Continual On-Line Diagnosis of Hybrid Faults
  • The General Convergence Problem: A Unification of Synchronous Systems
  • Specification and Verification of Distributed Protocols
  • Specification and Verification of Behavioral Patterns in Distributed Computations
  • Specification and Verification of an Atomic Broadcast Protocol
  • Trace-Based Compositional Refinement of Fault-Tolerant Distributed Systems
  • Design Techniques for Robustness
  • A Modular Robust Binary Tree