{"title":"Security and fault-tolerance in distributed systems: an actor-based approach","authors":"G. Agha, R. Ziaei","doi":"10.1109/CSDA.1998.798358","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798358","url":null,"abstract":"The inherent complexity of real-world distributed applications makes developing and maintaining software for these systems difficult and error-prone. We describe an actor-based meta-level model to address the complexity of distributed applications. Specifically, meta-level framework allow code implementing different design concerns to be factored into separate modules-thus enabling the separate development and modification of code for different non-functional requirements such as security and fault-tolerance. This paper reviews current research based on the model and outlines some research directions.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125356229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple dimensions of integrating development technology","authors":"B. Cheng","doi":"10.1109/CSDA.1998.798356","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798356","url":null,"abstract":"Studies have shown that errors are most likely to be introduced in the requirements phase of a development effort. This problem is largely due to prose descriptions that are ambiguous or inconsistent. One potential solution to this problem is to capture requirements information in the form of formal specifications that can be checked for consistency and completeness using automated techniques. However; during the initial phases of a project, it may be difficult to construct formal specifications directly. In contrast, many developers find it more intuitive to create diagram to model their systems. As a means to bridge the gap between formal and informal approaches to software development, we have investigated the formalization of a commonly used object-oriented modeling notation, Object Modeling Technique (OMT). The formalization of OMT enables the automated generation of formal specifications of the diagrams that can then be analyzed using simulation and model checking, and other types of verification techniques. Lessons from this integration effort can assist in the development of strategies for integrating techniques from the assurance, fault tolerance, and security fields. One key factor to this type of collaboration will be the use of a specific problem domain to focus the integration efforts. Another issue to be addressed is a common framework upon which the researchers from the three fields can build their integrated techniques.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130712282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bondavalli, A. Fantechi, D. Latella, L. Simoncini
{"title":"Towards a discipline of system engineering: validation of dependable systems","authors":"A. Bondavalli, A. Fantechi, D. Latella, L. Simoncini","doi":"10.1109/CSDA.1998.798362","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798362","url":null,"abstract":"Complex systems require the use of an integrated and best balanced set of components. The integration and the balanced set are crucial issues, which require some sort of verifiable compositionality property of component parts that contribute structurally, functionally, non functionally and interactionally to the total quality of the system design. This is even more important when dealing with the design of highly dependable systems. The concept of verifiable compositionality is much more demanding than the usual approach based on composition of building blocks. It implies the presentation of properties and the ability of verifying them, as well as those that are added (which mainly deal with interactions among parts) in the process of designing and building a system made of components. Economic reasons push towards the use of COTS (Commercial Off the Shell) and towards the re-use of available components and this trend poses new problems. Integration, compositionality and re-use appear to be tile very challenging issues in the validation (of both design and implementation) of complex systems, in particular dependable ones used for controlling critical applications, and require a special effort towards the emergence of a new discipline-System Engineering-which will encompass and integrate the current design disciplines. This paper aims at a discussion in the direction of identifying possible advanced approaches to the validation of dependable systems.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"79 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From security to safety and back","authors":"V. Stavridou, B. Dutertre","doi":"10.1109/CSDA.1998.798365","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798365","url":null,"abstract":"Dependability encompasses different classes of system properties, related to security, reliability, or safety. This paper examines the relevance of the security concept of noninterference to safety-related properties, and conversely, the applicability of fault-tolerance mechanisms usually applied to provide safety and reliability in the security domain. We suggest promising lines of research in the intersection of safety and security, in the application of security concepts and models to different classes of safety or fault-tolerance properties, and in the theory and practice of fault-tolerant systems applied to intrusion tolerance.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"37 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The 1998 York and Williamsburg workshops on dependability: the proposed research agenda","authors":"E. Sibley, B. Barnes","doi":"10.1109/CSDA.1998.798353","DOIUrl":"https://doi.org/10.1109/CSDA.1998.798353","url":null,"abstract":"We first provide a set of statements that explain the intent and discussion areas of the workshops. Dependability comprises three aspects: Attributes, which describe or limit dependability: these include availability, reliability, safety, confidentiality, integrity, and maintainability. Means, which refer to the major factors associated with dependability: fault prevention, fault tolerance, fault removal, and fault forecasting. Threats, which reduce or affect the dependability, including errors, faults, and failures. Dependable systems, among others, include: embedded systems, safety-critical systems, critical-information systems, and electronic commerce. The pair of workshops was initiated to discuss the means available and research to be accomplished in order to establish sets of scientific principles and practical engineering techniques for developing, maintaining, and evaluating dependable computer-based systems. Participants started by assuming that this could be initiated by concentrating on the integration of methods and disciplines used in the fields of security, fault-tolerance, and high-assurance, especially by concentrating on those techniques that enable measurement of their attributes. Emphasis was therefore placed on techniques that enable integration, composability, reuse, and cost prediction of dependable systems.","PeriodicalId":171437,"journal":{"name":"Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}