Dependable computing depends on structured fault tolerance
نویسنده
چکیده
Fault tolerance is a f u n d a m e n t a l technique f o r the a t ta inment of depen,dable computing. T h i s paper discusses a general paradigm for the design of faul t tolerant s y s t e m s and illustrates it by a design paradigm for faul t tolerant software.
منابع مشابه
DSO: Dependable Signing Overlay1
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the high intrusion-tolerance requirement in the face of availability, confidentiality and integrity attacks. In this paper, we propose Dependable Signing Overlay (DSO), a novel server architecture that can provide high intru...
متن کاملDSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the high intrusion-tolerance requirement in the face of availability, confidentiality and integrity attacks. In this paper, we propose Dependable Signing Overlay (DSO), a novel server architecture that can provide high intru...
متن کاملA Middleware for Dependable Distributed Real-Time Systems
New middleware is proposed to support the development of dependable distributed real-time systems for avionics, sensor and shipboard computing. Many of these systems require distributed computing in order to perform increasingly complex missions. They also require real-time performance, dependable software, and may face constraints that limit hardware redundancy. Real-time performance and fault...
متن کاملDependable Computing for National Security: A Position Paper
This paper examines various security threats and then discusses the applications of dependable computing for national security. By a dependable computing system we mean a flexible system that enforces quality of service policies between security, real-time processing, integrity and fault tolerance. We also discuss infrastructures and business objects for counter-terrorism.
متن کاملThe Research of Component-based Dependable Encapsulation
According to the component-based design and developing pattern, we present a plug-in architecture for the dependable component-based software. After that, the dependable encapsulation is put forwards, which mainly focuses on the component security and availability attributes. Finally, the developing and implementing method of security interceptor, high available load balancing and fault toleran...
متن کامل