Dependable Computing for Critical Applications 4 -
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre100,99 €
Occasion · Comme Neuf
Ou 25,25 € /mois
- Livraison : 25,00 €
- Livré entre le 6 et le 15 mai
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Dependable Computing For Critical Applications 4 Format Broché - Livre Informatique
0 avis sur Dependable Computing For Critical Applications 4 Format Broché - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Dependable Computing For Critical Applications 4 Format Broché
- Livre Informatique
Résumé :
This book contains articles accepted for presentation at the 4th IFIP Working Conference on Dependable Computing for Critical Applications. 21 papers selected from a total of 95 submitted articles address all aspects of dependability, a broad term defined as the degree of trust that may justifiably be placed in a system's reliability, availability, safety, security and performance. The presentations aim to contribute to a unified understanding and integration of these concepts, so future computer based systems will indeed be more dependable. In addition contributions to three panel sessions are included: The first, entitled Formal Methods for Safety in Critical Systems explored the role of formal methods in specifying and assessing system safety; the second, entitled Qualitative versus Quantitative Assessment of Security? debated the role that methods based on mathematical logic and stochastic techniques ought to play in assessing system security; and the third entitled Common Techniques for Fault-tolerance and Security explored techniques that are useful for attaining both fault-tolerance and security.
Sommaire:
Formal Methods for Critical Systems.- On Doubly Guarded Multiprocessor Control System Design.- Using Data Consistency Assumptions to Show System Safety.- Panel Session: Formal Methods for Safety in Critical Systems.- Are Formal Methods Ready for Dependable Systems?.- Industrial Use of Formal Methods.- Formal Methods for Safety in Critical Systems.- Can We Rely on Formal Methods?.- A Role for Formal Methodists.- Combining the Fault-Tolerance, Security and Real-Time Aspects of Computing.- Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler.- Fault-Detecting Network Membership Protocols for Unknown Topologies.- Secure Systems.- Denial of Service: A Perspective.- Reasoning About Message Integrity.- On the Security Effectiveness of Cryptographic Protocols.- Assessment of Dependability.- Assessing the Dependability of Embedded Software Sytems Using the Dynamic Flowgraph Methodology.- On Managing Fault-Tolerant Design Risks.- Panel Session: Quantitative versus Quantitative Aspects of Security.- Qualitative vs. Quantitative Assessment of Security: A Panel Discussion.- A Fault Forecasting Approach for Operational Security Monitoring.- Measurement of Operational Security.- Quantitative Measures of Security.- The Feasibility of Quantitative Assessment of Security.- Quantitative Measures vs. Countermeasures.- Basic Problems in Distributed Fault-Tolerant Systems.- Continual On-Line Diagnosis of Hybrid Faults.- The General Convergence Problem: A Unification of Synchronous Systems.- Specification and Verification of Distributed Protocols.- Specification and Verification of Behavioral Patterns in Distributed Computations.- Specification and Verification of an Atomic Broadcast Protocol.- Trace-Based Compositional Refinement of Fault-Tolerant Distributed Systems.- Design Techniques for Robustness.- A Modular Robust Binary Tree.- Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data.- Panel Session: Common Techniques in Fault-Tolerance and Security.- Common Techniques in Fault-Tolerance and Security.- Improving Security by Fault-Tolerance.- The Need for A Failure Model for Security.- Reliability and Security.- Fault Tolerance and Security.- Common Techniques in Fault Tolerance and Security (and Performance!).- Real-Time Systems.- Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs.- Scheduling Fault Recovery Operations for Time-Critical Applications.- Evaluation of Dependability Aspects.- Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques.- System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures.- Improving Availability Bounds Using the Failure Distance Concept.