Filters








29,897 Hits in 9.7 sec

Orthogonal Fault Tolerance for Dynamically Adaptive Systems [article]

Sobia K Khan
2014 arXiv   pre-print
The proposed approach provides a separation of fault tolerance concerns to study the effects of integrated fault tolerance on the system.  ...  This paper proposes an orthogonal fault tolerance model as a means to manage and reason about multiple fault tolerance mechanisms that co-exist in dynamically adaptive systems.  ...  We focused on software fault tolerance that uses design diversity to give system users continuous services. Design diversity mechanisms are mainly developed to deal with the design faults.  ... 
arXiv:1404.6830v1 fatcat:myiot7iswvfsbo34cof6jg5lpe

Systematic aid for developing middleware architectures

Valérie Issarny, Christos Kloukinas, Apostolos Zarras
2002 Communications of the ACM  
., to deal with problems like distribution, security, transactional processing, fault tolerance, etc..  ...  The use of middleware is the current practice for developing distributed systems.  ...  ., security and fault tolerance, as constraints that should not hold for compositions.  ... 
doi:10.1145/508448.508474 fatcat:k6jtjkjwqzanrkeobnl3fewbtq

Dependable Computing

Rogério de Lemos, Eliane Martins
2004 Journal of the Brazilian Computer Society  
Dependability can be attained by the combined use of rigorous design, verification and validation, and fault tolerance, while system evaluation should demonstrate that dependability was indeed attained  ...  When addressing security, confidentiality is an additional attribute, which allows to define security as a composite attribute of confidentiality, integrity and availability.  ...  Dependability can be attained by the combined use of rigorous design, verification and validation, and fault tolerance, while system evaluation should demonstrate that dependability was indeed attained  ... 
doi:10.1007/bf03192361 fatcat:lig5wwa6wzbnjaw3hzaofqev5m

Dependable Computing

Rogério de Lemos, Eliane Martins
2005 Journal of the Brazilian Computer Society  
Dependability can be attained by the combined use of rigorous design, verification and validation, and fault tolerance, while system evaluation should demonstrate that dependability was indeed attained  ...  When addressing security, confidentiality is an additional attribute, which allows to define security as a composite attribute of confidentiality, integrity and availability.  ...  Dependability can be attained by the combined use of rigorous design, verification and validation, and fault tolerance, while system evaluation should demonstrate that dependability was indeed attained  ... 
doi:10.1590/s0104-65002005000100001 fatcat:lna4adhdcfhxpcjujxjnsffk3m

An Analysis Tool Towards Fault Tolerance Systems based on AADL Error Model

Wenbing Zhang
2017 International Journal of Performability Engineering  
It is important to verify the ability of fault tolerance in system design phase especially for safety-critical systems.  ...  The Architecture Analysis and Design Language (AADL) and its Error Model Annex (EMV2) provide the ability to model a fault tolerance system.  ...  Usually the composite error behavior can be used to model the fault tolerance strategies towards the fault tolerance system.  ... 
doi:10.23940/ijpe.17.06.p6.844853 fatcat:feam3qjnq5e7telfbtehx4vewm

DMR-based Technique for Fault Tolerant AES S-box Architecture [article]

Mahdi Taheri, Saeideh Sheikhpour, Mohammad Saeed Ansari, Ali Mahani
2020 arXiv   pre-print
The proposed low-cost HFS-box provides a high capability of fault-tolerant against transient faults with any duration by putting low area overhead, i.e. 137%, and low throughput degradation, i.e. 11.3%  ...  till the fault effect disappears.  ...  In a fault attack, attackers inject malicious faults into the VLSI design of cryptographic primitives to extract secure information (i.e. cryptographic key).  ... 
arXiv:2009.05329v1 fatcat:bjuh7l6p6bfbvba7jz2rouxqwm

Intrusion-Tolerant Architectures: Concepts and Design [chapter]

Paulo Esteves Veríssimo, Nuno Ferreira Neves, Miguel Pupo Correia
2003 Lecture Notes in Computer Science  
Instead of trying to prevent every single intrusion, these are allowed, but tolerated: the system triggers mechanisms that prevent the intrusion from generating a system security failure.  ...  The paper describes the fundamental concepts behind IT, tracing their connection with classical fault tolerance and security.  ...  Acknowledgements Many of the concepts and design principles presented here derive both from past experience with fault-tolerant and secure system architectures, and from more recent work and challenging  ... 
doi:10.1007/3-540-45177-3_1 fatcat:sx5f2q77vbb3hefs4g2ln2cknu

Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability

S. Gnesi, G. Lenzini, F. Martinelli
2004 Electronical Notes in Theoretical Computer Science  
profitably used in definition and analysis of security properties.  ...  Precisely, our framework requires a systems to be modelled using a formal calculus, here the CCS process algebra, where both the failing behaviour of the system and the related fault-recovering procedures  ...  All the authors thank anonymous referees for their useful suggestions that have contributed to improve the overall presentation of the work.  ... 
doi:10.1016/j.entcs.2004.02.005 fatcat:ddu4hp5yqneahbtlnj3qhrkgii

Extended Fault Taxonomy of SOA-Based Systems

Guru Prasad Bhandari, Ratneshwer Gupta
2018 Journal of Computing and Information Technology  
Acknowledgment The authors would like to thank ICCR, Ministry of Foreign Affairs, India (Silver Jubilee Scholarship Scheme) for providing funds and DST-CIMS, Institute of Science, BHU, India for providing  ...  For security purpose, sensitive data should be in encrypted form, but there may be encryption fault and/or decryption fault to the service due to invalid request or design time fault.  ...  Due to heterogeneous systems [67] , it is not easy to ensure security and privacy of users. So security is a significant challenge [25] for the SBS fault handling.  ... 
doi:10.20532/cit.2017.1003569 fatcat:e2n4rz7spng5djjackpop6liyy

Fault Tolerance and QoS based Pervasive Computing using Markov State Transition Model

Beaulah David, Dr R. Santhosh
2018 International Journal of Engineering & Technology  
In order to overcome these limitations, Markov State Transition Based Fault Tolerance (MST-FT) Model is proposed.  ...  However, there is a need for a fault tolerance mechanism to reduce the link failures and unwanted mobile node access (in pervasive computing environment).  ...  Aspect-oriented middleware architecture also fulfilled the pervasive computing systems needs like mobility, fault tolerance and service distribution. Though, privacy and security remained unsolved.  ... 
doi:10.14419/ijet.v7i4.12664 fatcat:czt4s2zpqnbpzb3ftozqkolz6y

Merging paradigms of survivability and security

J. McDermott, A. Kim, J. Froscher
2003 Proceedings of the 2003 workshop on New security paradigms - NSPW '03  
Faults are examined by both the security and fault tolerance communities.  ...  This leaves us with two approaches that both fail to be comprehensive, depending on which community is looking at the system.  ...  Rath for posing the problem that led to our results.  ... 
doi:10.1145/986655.986659 dblp:conf/nspw/McDermottKF03 fatcat:ii23oirli5g4zchud52fwtqenq

Security-aware selection of Web Services for Reliable Composition [article]

Shahedeh Khani, Cristina Gacek, Peter Popov
2015 arXiv   pre-print
We propose to use an intrusion-tolerant composite web service for each functionality that should be fulfilled by a third party web service.  ...  Dependability is an important characteristic that a trustworthy computer system should have. It is a measure of Availability, Reliability, Maintainability, Safety and Security.  ...  Intrusion-tolerant systems can be developed using fault-tolerance concepts and approaches. Redundancy is believed to be a valid defence against physical faults.  ... 
arXiv:1510.02391v1 fatcat:qu67eiyllnbgvpsepbm2j3rtmm

BeeHive: Global Multimedia Database Support for Dependable, Real-Time Applications [chapter]

John A. Stankovic, Sang H. Son, Jörg Liebeherr
1998 Lecture Notes in Computer Science  
four APIs (the OS, network, fault tolerance and security APIs), and underlying novel object support.  ...  The BeeHive design is composed of native BeeHive sites, legacy sites ported to BeeHive, and interfaces to legacy systems outside of BeeHive (see Figure 1) .  ...  the design and implementation of the resource management, fault tolerance, and security subsystems.  ... 
doi:10.1007/3-540-49151-1_4 fatcat:fc7mldcl6fes3j7gfkay7hbqie

Beehive: Global Multimedia Database Support for Dependable, Real-Time Applications [chapter]

John Stankovic, Sang Son, Jörg Liebeherr
1997 Real-Time Database and Information Systems: Research Advances  
four APIs (the OS, network, fault tolerance and security APIs), and underlying novel object support.  ...  The BeeHive design is composed of native BeeHive sites, legacy sites ported to BeeHive, and interfaces to legacy systems outside of BeeHive (see Figure 1) .  ...  the design and implementation of the resource management, fault tolerance, and security subsystems.  ... 
doi:10.1007/978-1-4615-6069-2_22 fatcat:5jtweeqvhzeplpq4mxjzuu5oai

Fault Tolerance Using an SDN Pattern Framework

Nikolaos E. Petroulakis, George Spanoudakis, Ioannis G. Askoxylakis
2017 GLOBECOM 2017 - 2017 IEEE Global Communications Conference  
Such networks need to support communication services that offer guarantees about fault tolerance, redundancy, resilience and security.  ...  In this work, we propose a pattern framework built in an SDN controller able to import design patterns in a rule-based language and provide fault tolerance in SDN networks.  ...  It can be used by developers or administrators of SDN systems, not necessarily experts in SDN controllers to (a) create designs of their systems in ways guaranteed to satisfy S&D properties such as network  ... 
doi:10.1109/glocom.2017.8254082 dblp:conf/globecom/PetroulakisSA17 fatcat:s5kgw6kl4bbzflslffwa42iwbi
« Previous Showing results 1 — 15 out of 29,897 results