Management of Dependable Computing: Policies and Argumentation
نویسندگان
چکیده
The theme of this extended abstract is that, while the need for dependable computing has been around for a long time, there is a separate but related area, system safety, which has already had to tackle the problem of dependability seriously and explicitly. There is a lesson to be learned from safety-critical systems which can be applied to the management of dependable computing: to gain assurance of dependability, it is necessary to have a well-structured justification of the measures that are used to achieve it.
منابع مشابه
Incorporating Classical Logic Argumentation into Policy-based Inconsistency Management in Relational Databases
Inconsistency management policies allow a relational database user to express customized ways for managing inconsistency according to his need. For each functional dependency, a user has a library of applicable policies, each of them with constraints, requirements, and preferences for their application, that can contradict each other. The problem that we address in this work is that of determin...
متن کاملDependable Computing for National Security: A Position Paper
This paper examines various security threats and then discusses the applications of dependable computing for national security. By a dependable computing system we mean a flexible system that enforces quality of service policies between security, real-time processing, integrity and fault tolerance. We also discuss infrastructures and business objects for counter-terrorism.
متن کاملToward Stance Classification Based on Claim Microstructures
Claims are the building blocks of arguments and the reasons underpinning opinions, thus analyzing claims is important for both argumentation mining and opinion mining. We propose a framework for representing claims as microstructures, which express the beliefs, judgments, and policies about the relations between domainspecific concepts. In a proof-of-concept study, we manually build microstruct...
متن کاملDependable Self-Hosting Distributed Systems Using Constraints
We describe a technique for writing distributed applications which manage themselves over one or more utility computing infrastructures: by dynamically acquiring new computational resources, deploying themselves on these resources, and releasing others when no longer required. Unlike prior work, such management functionality is closely integrated with the application, allowing greater freedom i...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کامل