High-Assurance Service Systems

  • Jay Bayne


High-assurance systems (HAS) are information systems designed and implemented to achieve a degree of predictablebehavior, with predictability expressed in terms of their reliability, availability, safety, securityand timeliness(RASST) properties. High-assurance service systems(HASS) are a special class of HAS providing interactive, network-accessible and dynamically bound servicesto clients typically unknown at design time. Cyberphysical systems(CS) are, in turn, a special class of HASS responsible for automation and control services governing a wide range of physical processes. A service, in this context, results from transactional exchanges of information of specified valuebetween service providers (servers) and their customers (clients) on behalf of certain application-level objectives. These application-oriented transactions, carried out through discoverable service interface protocols, are governed by service level agreements(SLA) expressing performance-related assurancesthat servers agree, a priori,to provide to their clients. In dynamically bound service environments, specification of assurances depends on existence of a published set of performance indices and associated measurement processes for RASST and related properties. Consequently, high-assurance service systems require aperformance measurement framework(PMF) competent to express service-oriented value propositionsand their RASST dependencies. This chapter introduces a CS PMF, with a focus on three key elements. First, we introduce a cyberspatial reference model(CRM) for establishing the identity and location of distributed HASS servers and clients. Second, we define a set of service performance indices to measure RASST properties. Third, we develop an application neutral, yet operational definition of valueuseful in high assurance service systems for defining their respective value propositions.


Service System Service Level Agreement Service Request Service Invocation Viable System Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
  2. [2]
    J. Albus, “Outline for a Theory of Intelligence,” IEEE Trans System, Man and Cybernetics, Vol 21, No 3, June 1991Google Scholar
  3. [3]
    J.S. Anderson and E.D. Jensen, “Distributed Real-Time Specification of Java (DRTSJ)—A Status Report (Digest),” JTRES’06, October 11-13, 2006 Paris, FranceGoogle Scholar
  4. [4]
    R. Ashby, Introduction to Cybernetics, Chapman Hall, 1957Google Scholar
  5. [5]
    J.S. Bayne, “ A Software Architecture for Control of Value Production in Federated Systems,” World Multi-Conference on Systemics, Cybernetics & Informatics, Orlando, July 28th, published in the Journal of Systemics, Cybernetics & Informatics, Vol. 1, No. 8, August 2003Google Scholar
  6. [6]
    J.S. Bayne, Creating Rational Organizations—Theory of Enterprise Command and Control,Café Press, September 2006, 260 pages,
  7. [7]
    S. Beer, The Brain of the Firm, Wiley, 1994Google Scholar
  8. [8]
    S. Beer, Decision and Control, Wiley, 1988Google Scholar
  9. [9]
    R.C. Conant, “Laws of Information Which Govern Systems,” IEEE Trans of Systems, Man and Cybernetics, Vol 6, No 4, 1976Google Scholar
  10. [10]
    T. Erl, Service-Oriented Architecture, Prentice-Hall, 2005Google Scholar
  11. [11]
    J. Forrester, Collected Papers, Pegasus Communications, 1975 and
  12. [12]
  13. [13]
  14. [14]
  15. [15]
  16. [16]
  17. [17]
  18. [18]
  19. [19]
    E. Jaques, Requisite Organization, Cason Hall, 1992Google Scholar
  20. [20]
    E.E. Jensen, “Utility Functions: A General Scalable Technology for Software Execution Timeliness as a Quality of Service,” Proc. Software Technology Conf., Utah State Univ., April 2000Google Scholar
  21. [21]
    L. Lamport, “Time, Clocks, and the Ordering of Events in a Distributed System,” CACMVol. 21 No. 7, July 1978, pp 558-565MATHGoogle Scholar
  22. [22]
    P. Li, “Utility Accrual Real-Time Scheduling: Models and Algorithms,” PhD Thesis, Virginia Polytechnic & State University, 2004Google Scholar
  23. [23]
    K. Merchant and W. Van der Stede,, Management Control Systems, Prentice Hall, 2003Google Scholar
  24. [24]
    D.L. Mills, “Internet Time Synchronization: the Network Time Protocol,” IEEE Transactions on Communications, 39, 10 (October 1991), 1482-1493Google Scholar
  25. [25]
    Object Management Group (OMG), “Real-Time CORBA Specification,” V1.2,
  26. [26]
    RFC1305, NTP Standard,
  27. [27]
    RFC2460, IPv6 Standard,
  28. [28]
    RFC 2801, IOTP Standard,
  29. [29]
    RFC4330, SNTP Standard,
  30. [30]
    J. Spohrer, and D. Riecken, “Special Issue: Services Science,” Comm. ACM, July 2006Google Scholar
  31. [31]
    L. Whitman and B. Huff, “The Living Enterprise Model,” Automation and Robotics Research Institute, U Texas at Arlington, 2000Google Scholar
  32. [32]
    N. Wiener, Cybernetics, MIT Press, 1948Google Scholar
  33. [33]
    M. Wooldridge, Reasoning About Rational Agents, MIT Press, 2000Google Scholar

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  1. 1.Milwaukee InstituteMilwaukee

Personalised recommendations