Dependability Metrics: GI-Dagstuhl Research Seminar, Dagstuhl Castle, Germany, October 5 - November 1, 2005, Advanced LecturesIrene Eusgeld, Felix Freiling, Ralf H. Reussner This tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability of systems: reliability, security and performance. |
Contents
Introduction to Dependability Metrics | 2 |
I Foundations | 6 |
On Metrics and Measurements | 7 |
Validation of Predictions with Measurements | 14 |
From Design to Deployment | 19 |
Basic and Dependent Metrics | 37 |
Goal Question Metric | 39 |
Quality of Service Modeling Language | 43 |
Human Factors | 188 |
IV Performance Metrics | 196 |
Introduction to Performance Metrics | 197 |
PerformanceRelated Metrics in the ISO 9126 Standard | 204 |
Analytical Performance Metrics | 207 |
Performance Metrics in Software Design Models | 219 |
Techniques and Tools | 226 |
Performance Metrics for Specific Domains | 233 |
Markov Models | 48 |
II Reliability Metrics | 56 |
Hardware Reliability | 57 |
Software Reliability | 104 |
III Security Metrics | 126 |
Introduction to Security Metrics | 127 |
Cryptographic Attack Metrics | 133 |
Security Measurements and Metrics for Networks | 157 |
Industrial Approaches and Standards for Security Assessment | 166 |
Economic Security Metrics | 176 |
V Overlapping Metrics | 241 |
Introduction to Overlapping Attributes | 243 |
Performability | 245 |
A Subjective Overview | 255 |
Appendixpdf | 258 |
Biographies of Contributorspdf | 261 |
Referencespdf | 267 |
301 | |
Author Indexpdf | 304 |
Other editions - View all
Common terms and phrases
adversary Alamitos algorithm analysis analytical metric application approach architecture assessment attack metric attributes availability basic behaviour benchmark Berlin Heidelberg 2008 block cipher chapter characteristics complex component Computer Science constraints cryptographic cryptosystems defined Dependability Metrics described distribution estimate Eusgeld evaluation event example F.C. Freiling failure rate fault injection fault tolerance Fault-Tolerant Systems formula function goals hardware honeypots IEEE implementation Information Security input International Intrusion Detection key size LNCS Los Alamitos Markov chain methods monitoring operation parameters performance metrics Petri Nets probability properties queue random real-time related-key attacks Reliability Engineering reliability metrics reliability models reliability prediction resource response Reussner Eds reward risk scale security metrics software reliability specific SPNs Springer standard techniques Technology testing throughput tion transition University of Mannheim users validation values workload