Dependability Evaluation of Service-oriented Information System Using Computer Simulation and Post-processing Results

Lukasz Bagrij, K. Michalska, Marek Woda
{"title":"Dependability Evaluation of Service-oriented Information System Using Computer Simulation and Post-processing Results","authors":"Lukasz Bagrij, K. Michalska, Marek Woda","doi":"10.1109/DepCoS-RELCOMEX.2008.18","DOIUrl":null,"url":null,"abstract":"In times of known hacking techniques as well as malicious software ubiquity, mostly commercialized information systems are seriously threaten. For this reason nowadays network security and dependable operation has become a major priority for design and implementation. Looking for powerful means network engineers started to often use computer simulation technique as a way for better understanding and development of complex computer systems. Therefore, plenitude of specialized development initiatives appeared in last few years. Currently network simulators are tools useful not only for creating new and better protocols, but also become money savers. By extending their functionalities e.g. post-processing capabilities for evaluating security and dependability metrics they turn out to be a fundamental state of the art network management platforms. This paper presents the information system, proposes metrics definitions, and describes the procedure of their evaluation using a simulator and a post-processing module.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"59 22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In times of known hacking techniques as well as malicious software ubiquity, mostly commercialized information systems are seriously threaten. For this reason nowadays network security and dependable operation has become a major priority for design and implementation. Looking for powerful means network engineers started to often use computer simulation technique as a way for better understanding and development of complex computer systems. Therefore, plenitude of specialized development initiatives appeared in last few years. Currently network simulators are tools useful not only for creating new and better protocols, but also become money savers. By extending their functionalities e.g. post-processing capabilities for evaluating security and dependability metrics they turn out to be a fundamental state of the art network management platforms. This paper presents the information system, proposes metrics definitions, and describes the procedure of their evaluation using a simulator and a post-processing module.
基于计算机仿真和后处理结果的服务型信息系统可靠性评估
在黑客技术已知和恶意软件无处不在的时代,大多数商业化的信息系统受到严重威胁。因此,当今网络的安全和可靠运行已成为设计和实现的首要任务。为了寻找强大的手段,网络工程师开始经常使用计算机仿真技术作为更好地理解和开发复杂计算机系统的一种方式。因此,近年来出现了大量专门的发展倡议。目前,网络模拟器不仅可以用于创建新的更好的协议,而且还可以节省资金。通过扩展它们的功能,例如用于评估安全性和可靠性指标的后处理能力,它们成为最先进的网络管理平台的基本状态。本文介绍了信息系统,提出了指标的定义,并描述了使用模拟器和后处理模块对其进行评估的过程。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信