Dependable Computing for Critical Applications 4
This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on computer systems for critical applications? This conference, like its predecessors, addressed various aspects of dependability, a broad term defined as the degree of trust that may justifiably be placed in a system's reliability, availability, safety, security and performance. Because of its broad scope, a main goal was to contribute to a unified understanding and integration of these concepts. The Program Committee selected 21 papers for presentation from a total of 95 submissions at a September meeting in Menlo Park, California. The resulting program represents a broad spectrum of interests, with papers from universities, corporations and government agencies in eight countries. The selection process was greatly facilitated by the diligent work of the program committee members, for which we are most grateful. As a Working Conference, the program was designed to promote the exchange of ideas by extensive discussions. All paper sessions ended with a 30 minute discussion period on the topics covered by the session. In addition, three panel sessions have been organizcd.
1117015019
Dependable Computing for Critical Applications 4
This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on computer systems for critical applications? This conference, like its predecessors, addressed various aspects of dependability, a broad term defined as the degree of trust that may justifiably be placed in a system's reliability, availability, safety, security and performance. Because of its broad scope, a main goal was to contribute to a unified understanding and integration of these concepts. The Program Committee selected 21 papers for presentation from a total of 95 submissions at a September meeting in Menlo Park, California. The resulting program represents a broad spectrum of interests, with papers from universities, corporations and government agencies in eight countries. The selection process was greatly facilitated by the diligent work of the program committee members, for which we are most grateful. As a Working Conference, the program was designed to promote the exchange of ideas by extensive discussions. All paper sessions ended with a 30 minute discussion period on the topics covered by the session. In addition, three panel sessions have been organizcd.
54.99 In Stock
Dependable Computing for Critical Applications 4

Dependable Computing for Critical Applications 4

Dependable Computing for Critical Applications 4

Dependable Computing for Critical Applications 4

Paperback(Softcover reprint of the original 1st ed. 1995)

$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994. In keeping with the previous three conferences held in August 1989 at Santa Barbara (USA), in February 1991 at Tucson (USA), and in September 1992 at Mondello (Italy), the conference was concerned with an important basic question: can we rely on computer systems for critical applications? This conference, like its predecessors, addressed various aspects of dependability, a broad term defined as the degree of trust that may justifiably be placed in a system's reliability, availability, safety, security and performance. Because of its broad scope, a main goal was to contribute to a unified understanding and integration of these concepts. The Program Committee selected 21 papers for presentation from a total of 95 submissions at a September meeting in Menlo Park, California. The resulting program represents a broad spectrum of interests, with papers from universities, corporations and government agencies in eight countries. The selection process was greatly facilitated by the diligent work of the program committee members, for which we are most grateful. As a Working Conference, the program was designed to promote the exchange of ideas by extensive discussions. All paper sessions ended with a 30 minute discussion period on the topics covered by the session. In addition, three panel sessions have been organizcd.

Product Details

ISBN-13: 9783709193983
Publisher: Springer Vienna
Publication date: 02/12/2012
Series: Dependable Computing and Fault-Tolerant Systems , #9
Edition description: Softcover reprint of the original 1st ed. 1995
Pages: 499
Product dimensions: 6.69(w) x 9.61(h) x 0.04(d)

Table of Contents

Formal Methods for Critical Systems.- On Doubly Guarded Multiprocessor Control System Design.- Using Data Consistency Assumptions to Show System Safety.- Panel Session: Formal Methods for Safety in Critical Systems.- Are Formal Methods Ready for Dependable Systems?.- Industrial Use of Formal Methods.- Formal Methods for Safety in Critical Systems.- Can We Rely on Formal Methods?.- A Role for Formal Methodists.- Combining the Fault-Tolerance, Security and Real-Time Aspects of Computing.- Toward a Multilevel-Secure, Best-Effort Real-Time Scheduler.- Fault-Detecting Network Membership Prools for Unknown Topologies.- Secure Systems.- Denial of Service: A Perspective.- Reasoning About Message Integrity.- On the Security Effectiveness of Cryptographic Prools.- Assessment of Dependability.- Assessing the Dependability of Embedded Software Sytems Using the Dynamic Flowgraph Methodology.- On Managing Fault-Tolerant Design Risks.- Panel Session: Quantitative versus Quantitative Aspects of Security.- Qualitative vs. Quantitative Assessment of Security: A Panel Discussion.- A Fault Forecasting Approach for Operational Security Monitoring.- Measurement of Operational Security.- Quantitative Measures of Security.- The Feasibility of Quantitative Assessment of Security.- Quantitative Measures vs. Countermeasures.- Basic Problems in Distributed Fault-Tolerant Systems.- Continual On-Line Diagnosis of Hybrid Faults.- The General Convergence Problem: A Unification of Synchronous Systems.- Specification and Verification of Distributed Prools.- Specification and Verification of Behavioral Patterns in Distributed Computations.- Specification and Verification of an Atomic Broadcast Prool.- Trace-Based Compositional Refinement of Fault-Tolerant Distributed Systems.- Design Techniques for Robustness.- A Modular Robust Binary Tree.- Secondary Storage Error Correction Utilizing the Inherent Redundancy of the Stored Data.- Panel Session: Common Techniques in Fault-Tolerance and Security.- Common Techniques in Fault-Tolerance and Security.- Improving Security by Fault-Tolerance.- The Need for A Failure Model for Security.- Reliability and Security.- Fault Tolerance and Security.- Common Techniques in Fault Tolerance and Security (and Performance!).- Real-Time Systems.- Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs.- Scheduling Fault Recovery Operations for Time-Critical Applications.- Evaluation of Dependability Aspects.- Effects of Physical Injection of Transient Faults on Control Flow and Evaluation of Some Software-Implemented Error Detection Techniques.- System-Level Reliability and Sensitivity Analyses for Three Fault-Tolerant System Architectures.- Improving Availability Bounds Using the Failure Distance Concept.
From the B&N Reads Blog

Customer Reviews