Dependability: from Concepts to Limits
Our society is faced with an ever increasing dependence on computing systems, which lead to question ourselves about the limits of their dependability. In order to respond this question, a global conceptual and terminological framework is needed, which is first given. The analysis of the limits in dependability which is then conducted identifies design faults as the major limiting factor, a consequence of which is the concluding recommendation of applying a fault tolerance approach to the improvement of the production process.
KeywordsFault Tolerance Software Fault Fault Injection Covert Channel Fault Removal
Unable to display preview. Download preview PDF.
- Arl 90.J. Arlat, M. Aguera, L. Amat, Y. Crouzet, J.C. Fabre, J.C. Laprie, E. Martins, D. Powell, “Fault injection for dependability validation: a methodology and some applications”, IEEE Transactions on Software Engineering, Special Issue on Experimental Computer Science, vol. 16, no. 2, Feb. 1990, pp. 166–182CrossRefGoogle Scholar
- Arn 73.
- Bou 69.W.G. Bouricius, W.C. Carter, P.R. Schneider, “Reliability Modeling Techniques for Self-Repairing Computer Systems”, Proc. 24th ACM National Conf., 1969, pp. 295–309.Google Scholar
- COM 92.“Computing the Future”, Report of the Committee to Asses the Scope and Direction of Computer Science and Technology of the National Research Council, Communications of ACM, vol. 35, no. 11, Nov. 1992, pp. 30–40.Google Scholar
- Che 78.L. Chen, A. Avizienis, “N-version programming: a fault-tolerance approach to reliability of software operation”, Proc. 8th IEEE Int. Symp. on Fault Tolerant Computing (FTCS-8), Toulouse, France, June 1978, pp. 3–9.Google Scholar
- Cho 92.
- Cra 92.R. Cramp, M.A. Vouk, W. Jones, “On operational availability of a large software-based telecommunications system”, Proc. 3rd Int. Symp. on Software Reliability Engineering, Research Triangle Park, North Carolina, Oct. 1992, pp. 358–366.Google Scholar
- Dav 81.
- Des 91.Y. Deswarte, L. Blain, J.C. Fabre, “Intrusion tolerance in distributed computing systems”, Proc. 1991 IEEE Symposium on Research in Security and Privacy, Oakland (USA), 20–22 Mai 1991, pp.110–121Google Scholar
- Dug 89.
- Eck 91.
- EEC 91.Information Technology Security Evaluation Criteria, Provisional Harmonised criteria, Office for Official Publications of the European Communities, June 1991.Google Scholar
- Elm 72.W.R. Elmendorf, “Fault-tolerant programming”, Proc. 2nd IEEE Int. Symp. on Fault Tolerant Computing (FTCS-2), Newton, Massachusetts, June 1972, pp. 79–83.Google Scholar
- Gas 88.M. Gasser, Building a Secure Computer System, Van Nostrand Reinhold, 1988.Google Scholar
- Geb 88.J. Gebman, D. McIver, H. Shulman, “Faults with nonstationary observability are limiting avionics R&M”, Proc. 8th AIAA/IEEE Digital Systems Avionics Conf., San Jose, California, Oct. 1988, pp. 16–23.Google Scholar
- Ghe 91.C. Ghezzi, M. Jazayeri, D. Mandrioli, Fundamentals of Software Engineering, Prentice-Hall, 1991Google Scholar
- Gla 81.
- Gra 86.J.N. Gray, “Why do computers stop and what can be done about it?”, Proc. 5th Symp. on Reliability in Distributed Software and Database Systems, Los Angeles, Jan. 1986, pp. 3–12.Google Scholar
- Gra 90.
- Gun 89.U. Gunneflo, J. Karlsson, J. Torin, “Evaluation of error detection schemes using fault injection by heavy-ion radiation”, Proc. 19th IEEE Int. Symp. on Fault Tolerant Computing (FTCS-19), Chicago, June 1989, pp. 340–347.Google Scholar
- Hec 87.
- Hua 93.Y. Huang, C. Kintala, “Software implemented fault tolerance: technologies and experience”, Proc. 23rd IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-23), Toulouse, June 1993, pp. 2–9.Google Scholar
- Iye 82.
- Jac 91.J. Jacob, “The basic integrity theorem”, Prcc. IEEE International Symposium on Security and Privacy, Oakland, May 1991, pp. 89–97.Google Scholar
- Jon 92.E. Jonsson, T. Olovsson, “On the Integration of Security and Dependability in Computer Systems”, Proc. IASTED Int. Conf. for Reliability, Quality Control and Risk Assessment, 1992.Google Scholar
- Jos 88.M.K. Joseph, A. Avizienis, “A fault tolerance approach to computer viruses”, Proc. 1988 Symp. on Security and Privacy, Oakland, April 1988, pp. 52–58.Google Scholar
- Kan 87.K. Kanoun, T. Sabourin, “Software dependability of a telephone switching system”, Proc. 17th IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-17), Pittsburgh, Pennsylvania, USA, June 1987, pp. 236–241.Google Scholar
- Kui 85.B. Kuipers, “Commonsense reasoning about causality: deriving behavior from structure”, in Qualitative Reasoning about Physical Systems, D.G. Bobrow editor, MIT Press, 1985, pp. 169–203.Google Scholar
- Lap 90.
- Lap 92a.
- Lap 92b.J.C. Laprie, “Dependability: a unifying concept for reliable, safe, secure computing”, Proc. 12th IFIP World Computer Congress, Madrid, Spain, Sept. 1992, vol. I, pp. 585–593Google Scholar
- Lap 92c.J.C. Laprie, “For a product-in-a-process approach to software reliability evaluation”, Proc. 3rd Int. Symp. on Software Reliability Engineering, Research Triangle Park, NC, Oct. 1992, pp. 134–139.Google Scholar
- Max 86.R.A. Maxion, “Towards fault-tolerant user interfaces”, Proc. 5th IFAC Workshop on Safety of Computer Control Systems (SAFECOMP’86), Sarlat, France, Oct. 1986, pp. 117–122.Google Scholar
- Nor 83.
- Par 90.
- Pow 92.D. Powell, “Failure Mode Assumptions and Assumption Coverage”, Proc. 22nd IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-22), Boston, July 1992, pp.386–395.Google Scholar
- Rab 89.
- Ran 75.
- Rou 87.
- Sie 92.D.P. Siewiorek, R.S. Swarz, The Theory and Practice of Reliable System Design, Digital Press, 1992.Google Scholar
- The 91.
- Toy 78.
- Vog 88.U. Voges, ed., Application of design diversity in computerized control systems, Springer Verlag, Vienna, 1988.Google Scholar
- Wil 92.