Error Recovery in Critical Infrastructure Systems - Computer Security, Dependability and Assurance: From Needs to Solutions, 1998. Proceedings

نویسنده

  • Xing Du
چکیده

Criticul infrastructure applications pmvide services upon which society depends heavily; such applications require survivabiliry in the face of faults that mighr cause a loss of service. These applications are lhemselves dependent on distributed information systems for all aspects of their operation ond so survivability of rhe information systems is an important issue. Fault tolerance is U key mechanism by which survivnbiliry can be achieved in these information systems. Much of the liternrum on fault-toleranr distribicted sysrems focuses on local error recovery by masking rhe effects of faults. We describe a direction for error recovery in rheface of catastrophic faults where the effects of the faulrs cannot be masked using available resources. The god is to provide conrimed service that is either on alrer,tate or degraded service by reconfiguring the system rather than masking faults. We outline rhe requirements for a reconjgurable system archirecrure and present an error recovery system that enables sysrematic srructuring of error recovery specificarions and implementations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-Healing and Secure Adaptive Messaging Middleware for Business-Critical Systems

Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Selfhealing is either rudimentary or non-existent. In this study we present a self-healing and secure ad...

متن کامل

Information Assurance

1.1 INTRODUCTION Recent advances in computer networks and information technology (IT) and the advent and growth of the Internet have created unprecedented levels of opportunities for the connectivity and interaction of information systems at a global level. This has provided significant new possibilities for advancing knowledge and societal interactions across the spectrum of human endeavors , ...

متن کامل

A cohesive framework to quantify computer systems assurance

This study introduces a systems-engineering and evaluation methodology that focuses on the stability of an entire computing infrastructure. More specifically, the conducted research elaborates on the cohesive systems assurance (CSA) methodology, which encapsulates the concepts and methods of product assurance (reliability, availability, and maintainability), performance & scalability, and depen...

متن کامل

Integrating Security into the Curriculum

he number of skilled practitioners of computer security who are able to address the complexities of modern technology and are familiar with successful approaches to system security is very small. People want security but are faced with two difficulties. First, they do not know how to achieve it in the context of their enterprises. They may not even know of a way to translate organizational proc...

متن کامل

Continuously revised assurance cases with stakeholders' cross-validation: a DEOS experience

Recently, assurance cases have received much attention in the field of software-based computer systems and IT services. However, software changes very often, and there are no strong regulations for software. These facts are two main challenges to be addressed in the development of software assurance cases. We propose a method of developing assurance cases by means of continuous revision at ever...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999