Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)最新文献

筛选
英文 中文
Security and fault-tolerance in distributed systems: an actor-based approach 分布式系统中的安全性和容错性:基于参与者的方法
G. Agha, R. Ziaei
{"title":"Security and fault-tolerance in distributed systems: an actor-based approach","authors":"G. Agha, R. Ziaei","doi":"10.1109/CSDA.1998.798358","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798358","url":null,"abstract":"The inherent complexity of real-world distributed applications makes developing and maintaining software for these systems difficult and error-prone. We describe an actor-based meta-level model to address the complexity of distributed applications. Specifically, meta-level framework allow code implementing different design concerns to be factored into separate modules-thus enabling the separate development and modification of code for different non-functional requirements such as security and fault-tolerance. This paper reviews current research based on the model and outlines some research directions.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125356229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multiple dimensions of integrating development technology 多维度集成开发技术
B. Cheng
{"title":"Multiple dimensions of integrating development technology","authors":"B. Cheng","doi":"10.1109/CSDA.1998.798356","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798356","url":null,"abstract":"Studies have shown that errors are most likely to be introduced in the requirements phase of a development effort. This problem is largely due to prose descriptions that are ambiguous or inconsistent. One potential solution to this problem is to capture requirements information in the form of formal specifications that can be checked for consistency and completeness using automated techniques. However; during the initial phases of a project, it may be difficult to construct formal specifications directly. In contrast, many developers find it more intuitive to create diagram to model their systems. As a means to bridge the gap between formal and informal approaches to software development, we have investigated the formalization of a commonly used object-oriented modeling notation, Object Modeling Technique (OMT). The formalization of OMT enables the automated generation of formal specifications of the diagrams that can then be analyzed using simulation and model checking, and other types of verification techniques. Lessons from this integration effort can assist in the development of strategies for integrating techniques from the assurance, fault tolerance, and security fields. One key factor to this type of collaboration will be the use of a specific problem domain to focus the integration efforts. Another issue to be addressed is a common framework upon which the researchers from the three fields can build their integrated techniques.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130712282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a discipline of system engineering: validation of dependable systems 迈向系统工程的一门学科:可靠系统的验证
A. Bondavalli, A. Fantechi, D. Latella, L. Simoncini
{"title":"Towards a discipline of system engineering: validation of dependable systems","authors":"A. Bondavalli, A. Fantechi, D. Latella, L. Simoncini","doi":"10.1109/CSDA.1998.798362","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798362","url":null,"abstract":"Complex systems require the use of an integrated and best balanced set of components. The integration and the balanced set are crucial issues, which require some sort of verifiable compositionality property of component parts that contribute structurally, functionally, non functionally and interactionally to the total quality of the system design. This is even more important when dealing with the design of highly dependable systems. The concept of verifiable compositionality is much more demanding than the usual approach based on composition of building blocks. It implies the presentation of properties and the ability of verifying them, as well as those that are added (which mainly deal with interactions among parts) in the process of designing and building a system made of components. Economic reasons push towards the use of COTS (Commercial Off the Shell) and towards the re-use of available components and this trend poses new problems. Integration, compositionality and re-use appear to be tile very challenging issues in the validation (of both design and implementation) of complex systems, in particular dependable ones used for controlling critical applications, and require a special effort towards the emergence of a new discipline-System Engineering-which will encompass and integrate the current design disciplines. This paper aims at a discussion in the direction of identifying possible advanced approaches to the validation of dependable systems.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"79 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From security to safety and back 从安全到安全再回来
V. Stavridou, B. Dutertre
{"title":"From security to safety and back","authors":"V. Stavridou, B. Dutertre","doi":"10.1109/CSDA.1998.798365","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798365","url":null,"abstract":"Dependability encompasses different classes of system properties, related to security, reliability, or safety. This paper examines the relevance of the security concept of noninterference to safety-related properties, and conversely, the applicability of fault-tolerance mechanisms usually applied to provide safety and reliability in the security domain. We suggest promising lines of research in the intersection of safety and security, in the application of security concepts and models to different classes of safety or fault-tolerance properties, and in the theory and practice of fault-tolerant systems applied to intrusion tolerance.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"37 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
The 1998 York and Williamsburg workshops on dependability: the proposed research agenda 1998年约克和威廉斯堡关于可靠性的研讨会:拟议的研究议程
E. Sibley, B. Barnes
{"title":"The 1998 York and Williamsburg workshops on dependability: the proposed research agenda","authors":"E. Sibley, B. Barnes","doi":"10.1109/CSDA.1998.798353","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798353","url":null,"abstract":"We first provide a set of statements that explain the intent and discussion areas of the workshops. Dependability comprises three aspects: Attributes, which describe or limit dependability: these include availability, reliability, safety, confidentiality, integrity, and maintainability. Means, which refer to the major factors associated with dependability: fault prevention, fault tolerance, fault removal, and fault forecasting. Threats, which reduce or affect the dependability, including errors, faults, and failures. Dependable systems, among others, include: embedded systems, safety-critical systems, critical-information systems, and electronic commerce. The pair of workshops was initiated to discuss the means available and research to be accomplished in order to establish sets of scientific principles and practical engineering techniques for developing, maintaining, and evaluating dependable computer-based systems. Participants started by assuming that this could be initiated by concentrating on the integration of methods and disciplines used in the fields of security, fault-tolerance, and high-assurance, especially by concentrating on those techniques that enable measurement of their attributes. Emphasis was therefore placed on techniques that enable integration, composability, reuse, and cost prediction of dependable systems.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信