Dependable Computing for Critical Applications 5, Volume 5
Ravishankar K. Iyer, W. Kent Fuchs, Virgil Gligor, Michele Morganti
IEEE Computer Society, 1998 - Computers - 344 pages
Can we rely on computers? The individual aspects of system dependability, reliability, availability, safety, and security are the factors that determine application success. To answer this question, the text explores the integration of these dependability attributes within practical, working systems. The papers in the book address the growing international concern for system dependability and reflect the important advances in understanding how dependability manifests in practice.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Dependability of the 777 Primary Flight Control System
Dependable HighVoltage Substation Protection
16 other sections not shown
Alamitos algorithms analysis application ARINC authentication branch free interval branch-free block broadcast busbar Calif CFID checkpoint checksums communication Computer Society Press Computer Systems control flow errors control flow faults coverage CReP Cryptographic Protocols cycle DDVDS Distributed Systems EDMs encrypted error detection example fail-safe fail-stop protocols failure fault detection fault injection fault model fault tolerance Fault-Tolerant Computing fault-tolerant system Figure function hardware faults holder IEEE Computer Society IEEE Trans implemented initiator input instruction Int'l latency Los Alamitos modules monitoring Needham-Schroeder number of messages objects on-demand protocol operating system overhead partition block performance Proc received recovery redundancy restart rollback route scheme secrecy assumption Section sender signal signature software fault Symp techniques timeout token transient faults transit node triggers undetected updates validation variants verified watchdog processor Xception