ebook img

ReSIST: Resilience for Survivability in IST - Universidade de Lisboa PDF

345 Pages·2006·3.43 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview ReSIST: Resilience for Survivability in IST - Universidade de Lisboa

ReSIST : Resilience for Survivability in IST A European Network of Excellence Contract Number: 026764 Deliverable D12 Resilience-Building Technologies: State of Knowledge T Report Preparation Date: September 2006 Classification: Public Circulation F Contract Start Date: 1st January 2006 Contract Duration: 36 months Project Co-ordinator: LAAS-CNRS A Partners: Budapest University of Technology and Economics City University, London Technische Universität Darmstadt Deep Blue Srl Institut Eurécom France Telecom Recherche et Développement R IBM Research GmbH Université de Rennes 1 – IRISA Université de Toulouse III – IRIT Vytautas Magnus University, Kaunas Fundação da Faculdade de Ciencas da Universidade de Lisboa University of Newcastle upon Tyne D Università di Pisa QinetiQ Limited Università degli studi di Roma "La Sapienza" Universität Ulm University of Southampton CONTENTS: D12: “Resilience-building Technologies: State of Knowledge” Introduction.................................................................................................................................intro 1 Part Arch – Resilience Architecting and Implementation Paradigms....................................arch 1 Introduction....................................................................................................................................arch 2 1 – Service Oriented Architectures.................................................................................................arch 4 Introduction.......................................................................................................................arch 4 1.1 Research on SOA........................................................................................................arch 6 1.2 Recent research work in RESIST..............................................................................arch 10 2 – Mobile Services and their Infrastructures...............................................................................arch 13 Introduction.....................................................................................................................arch 13 2.1 Fundamental research lines.......................................................................................arch 14 2.2 Recent research work in RESIST..............................................................................arch 16 3 – Building Resilient Architectures with Off-the-shelf Components.........................................arch 18 Introduction.....................................................................................................................arch 18 3.1 Lines of research on resilience with OTS components.............................................arch 20 3.2 Recent Research Work in ReSIST............................................................................arch 23 4 – Intrusion Tolerant Architectures............................................................................................arch 26 Introduction.....................................................................................................................arch 26 4.1 Intrusion-tolerance in computing systems.................................................................arch 27 4.2 Intrusion-tolerance mechanisms................................................................................arch 29 4.3 Examples of intrusion-tolerant systems and architectures........................................arch 31 4.4 Recent Research Work in ReSIST............................................................................arch 32 Conclusions..................................................................................................................................arch 36 References....................................................................................................................................arch 37 Part Algo – Resilience Algorithms and Mechanisms.................................................................algo 1 Introduction....................................................................................................................................algo 2 1– Byzantine Consensus in Asynchronous Message-Passing Systems: a Survey.............................................................................................................................................algo 9 Introduction.......................................................................................................................algo 9 1.1. Byzantine Consensus Definitions.............................................................................algo 10 1.2. FLP Impossibility.....................................................................................................algo 12 1.3. Circumventing FLP..................................................................................................algo 13 1.4. Performance and Scalability.....................................................................................algo 16 1.5. Related and Equivalent Problems.............................................................................algo 17 Conclusion.......................................................................................................................algo 18 2 – On-Line Diagnosis of Transients in Distributed Systems......................................................algo 19 Introduction.....................................................................................................................algo 19 2.1. Background..............................................................................................................algo 20 2.2. State of Knowledge in ReSIST................................................................................algo 21 2.3. On-going and Future Directions...............................................................................algo 24 3 – A Survey of Cooperative Backup Mechanisms......................................................................algo 26 RESIST D12 contents i D12 Contents 3.1. Introduction and Motivations...................................................................................algo 26 3.2. Characterization of Cooperative Backup Systems...................................................algo 28 3.3. Existing Cooperative Backup Systems.....................................................................algo 31 3.4. Storage Management................................................................................................algo 32 3.5. Dependability Techniques........................................................................................algo 34 Conclusion.......................................................................................................................algo 38 4 - Wait-free objects: an introduction for the sophomore...........................................................algo 39 Introduction.....................................................................................................................algo 39 4.1. Computation model..................................................................................................algo 40 4.2. A very simple wait-free object: a counter................................................................algo 42 4.3. Another simple wait-free object: a splitter...............................................................algo 43 4.4. A less trivial wait-free object: a snapshot object......................................................algo 45 4.5. A snapshot construction...........................................................................................algo 46 4.6. Proof of the construction..........................................................................................algo 49 4.7. Our (2006) contribution to wait-free computing......................................................algo 51 4.8. Scalability issues in wait-free computing.................................................................algo 52 5 – Cooperation Incentive Schemes............................................................................................algo 53 Introduction.....................................................................................................................algo 53 5.1. Applications.............................................................................................................algo 54 5.2. Incentive Schemes....................................................................................................algo 58 5.3. Validation techniques...............................................................................................algo 68 Conclusion.......................................................................................................................algo 74 6– Connectivity in Unstructured Overlay Networks....................................................................algo 75 Introduction.....................................................................................................................algo 75 6.1. Taxonomy of Overlay Maintenance Protocols.........................................................algo 76 6.2. Protocols Description...............................................................................................algo 76 6.3. Protocols Evaluation.................................................................................................algo 81 Conclusion.......................................................................................................................algo 86 7 – High assurance voting systems...............................................................................................algo 87 Introduction.....................................................................................................................algo 87 7.1. The Requirements.....................................................................................................algo 88 7.2. Cryptographic schemes............................................................................................algo 89 7.3. Cryptographic primitives..........................................................................................algo 91 7.4. Voter-verifiable, cryptographic schemes..................................................................algo 93 7.5. Scalability and Interoperability................................................................................algo 97 Conclusions and prospects..............................................................................................algo 97 References....................................................................................................................................algo 99 Part Socio – Resilient Socio-Technical Systems........................................................................socio 1 Definition of a socio-technical system..........................................................................................socio 2 Introduction...................................................................................................................................socio 2 1 – Understanding the structure and organisation of socio-technical systems: representation and modelling................................................................................................................................socio 3 1.1. Elicitation and observation........................................................................................socio 3 1.2. Modelling the task.....................................................................................................socio 4 1.3. Modelling the device.................................................................................................socio 5 RESIST D12 contents ii D12 Contents 1.4. Modelling the user (syndetic modelling)...................................................................socio 7 1.5. Open issues................................................................................................................socio 7 2 – Evaluation and verification issues in resilience in socio-technical systems..........................socio 10 Introduction....................................................................................................................socio 10 2.1. Automation and function allocation........................................................................socio 11 2.2. Considering the user and usability evaluation.........................................................socio 14 2.3. Safety assessment....................................................................................................socio 15 2.4. Formal verification of interactive systems..............................................................socio 19 2.5. Issues of scale..........................................................................................................socio 20 2.6. System evaluation....................................................................................................socio 21 Conclusions.................................................................................................................................socio 26 References...................................................................................................................................socio 27 Part Eval – Methods and Tools for Resilience Evaluation.......................................................eval 1 Introduction.....................................................................................................................................eval 2 1 – Compositional Modelling for Large and Evolving Systems.....................................................eval 7 Introduction........................................................................................................................eval 7 1.1. Model construction techniques....................................................................................eval 8 1.2. Solution approaches..................................................................................................eval 13 1.3. Large and evolving systems......................................................................................eval 14 Conclusion........................................................................................................................eval 16 2 – Evaluation with respect to Malicious Threats.........................................................................eval 17 Introduction......................................................................................................................eval 17 2.1. Security evaluation criteria........................................................................................eval 17 2.2. Model-based evaluations...........................................................................................eval 18 2.3. Experimental evaluations..........................................................................................eval 19 Conclusion........................................................................................................................eval 22 3 – Dependability Benchmarking..................................................................................................eval 24 Introduction......................................................................................................................eval 24 3.1. Dependability benchmarking approaches..................................................................eval 24 3.2. Accidental faults........................................................................................................eval 27 3.3 Intrusions....................................................................................................................eval 29 Conclusion........................................................................................................................eval 30 4 – Diversity..................................................................................................................................eval 32 Introduction......................................................................................................................eval 32 4.1. Background...............................................................................................................eval 32 4.2. Diverse parallel systems............................................................................................eval 35 4.3. Human-computer diversity........................................................................................eval 39 4.4. Diversity in development to generate dependability.................................................eval 39 4.5. Diversity in arguments..............................................................................................eval 40 Conclusion....................................................................................................................... eval 41 5 – Dependability Cases............................................................................................................... eval 42 Introduction..................................................................................................................... eval 42 5.1. Safety cases.............................................................................................................. eval 42 5.2 Security cases............................................................................................................ eval 43 Conclusion....................................................................................................................... eval 44 RESIST D12 contents iii D12 Contents Conclusion.................................................................................................................................... eval 46 References.................................................................................................................................... eval 49 Part Verif – Methods and Tools for Verifying Resilience........................................................ verif 1 Introduction................................................................................................................................... verif 2 1 – Deductive Theorem Proving.................................................................................................... verif 5 Introduction...................................................................................................................... verif 5 1.1. Deductive Theorem Proving for Fault-Tolerant Real-Time Systems........................ verif 7 Conclusions and Perspectives........................................................................................ verif 11 2 – Model Checking.................................................................................................................... verif 13 Introduction.................................................................................................................... verif 13 2.1. Abstraction in Model Checking.............................................................................. verif 14 2.2. Process algebras and action-based model checking applied to fault-tolerant systems..................................................................................................... verif 18 2.3. Model Checking for Exhaustive Fault Simulation.................................................. verif 20 2.4. Case Studies in refinement-style Model Checking.................................................. verif 22 Conclusions.................................................................................................................... verif 28 3 – Symbolic Execution and Abstract Interpretation................................................................... verif 30 Introduction.................................................................................................................... verif 30 3.1. Program Slicing....................................................................................................... verif 30 3.2. Type Based Analysis............................................................................................... verif 32 3.3. Abstract interpretation............................................................................................. verif 33 Conclusions.................................................................................................................... verif 36 4 – Robustness Testing................................................................................................................ verif 37 Introduction.................................................................................................................... verif 37 4.1. Workload-based approaches.................................................................................... verif 38 4.2. Faultload-based approaches.................................................................................... verif 38 4.3. Mixed Workload- and Faultload-based Approaches............................................... verif 41 Conclusions and Perspective.......................................................................................... verif 46 Acknowledgements........................................................................................................ verif 47 5 – Verification of Systems Containing Cryptography............................................................... verif 48 Introduction.................................................................................................................... verif 48 5.1. Secure Channels as an Example of Cryptography within Larger Systems............. verif 48 5.2. Generalizing the Example....................................................................................... verif 49 5.3. Reactive Simulatability........................................................................................... verif 49 5.4. System Model.......................................................................................................... verif 50 5.5. Individual Security Properties................................................................................. verif 51 5.6. Dolev-Yao Models.................................................................................................. verif 52 Conclusion...................................................................................................................... verif 52 References................................................................................................................................... verif 54 RESIST D12 contents iv APPENDIX CONTENTS: Part ARCH [Arief et al. 2006] B. Arief, A. Iliasov, and A. Romanovsky, "On Using the CAMA Framework for Developing Open Mobile Fault Tolerant Agent Systems", Workshop on Software Engineering for Large- Scale Multi-Agent Systems, pp. 29-35, May 2006. [Avizienis 2006] A. Avizienis. "An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-Organizing Systems", Proceedings of the IFIP 19th World Computer Congress, 1st IFIP International Conference on Biologically Inspired Computing, pp. 1-6., 2006. [Becker et al. 2006] S. Becker, A. Brogi, I. Gorton, S. Overhage, A. Romanovsky and M. Tivoli, "Towards an Engineering Approach to Component Adaptation", R. H. Reussner, J. A. Stafford and C. A. Szyperski, editors, Architecting Systems with Trustworthy Components, Vol. 3938 of LNCS, pp. 193-215, 2006. [Damasceno et al. 2006] K. Damasceno, N. Cacho, A. Garcia, A. Romanovsky, and C. Lucena, "Context- Aware Exception Handling in Mobile Agent Systems: The MoCA Case", Workshop on Software Engineering for Large-Scale Multi-Agent Systems, May 2006. [Gashi and Popov 2006] I. Gashi and P. Popov. "Rephrasing Rules for Off-The-Shelf SQL Database Servers", Proceedings of the 6th European Dependable Computing Conference, October 2006. [Gashi et al. 2006b] I. Gashi, P. Popov and L. Strigini "Fault Tolerance via Diversity for Off-the-shelf Products: A Study with SQL Database Servers", manuscript, 2006. [Gonczy and Varro 2006] L. Gonczy and D. Varro "Modeling of Reliable Messaging in Service Oriented Architectures", Andrea Polini, editor, Proceedings of the International Workshop on Web Services Modeling and Testing, pp. 35-49, 2006. [Karjoth et al. 2006] G. Karjoth, B. Pfitzmann, M. Schunter, and M. Waidner "Service-oriented Assurance- Comprehensive Security by Explicit Assurances", Proceedings of the 1st Workshop on Quality of Protection, LNCS, to appear in 2006. [Martin-Guillerez et al. 2006] D. Martin-Guillerez, M. Banâtre and P. Couderc, “A Survey on Communication Paradigms for Wireless Mobile Appliances”, INRIA Report, May 2006. [Mello et al. 2006] E. Ribeiro de Mello, S. Parastatidis, P. Reinecke, C. Smith, A. van Moorsel, and J. Webber "Secure and Provable Service Support for Human-Intensive Real-Estate Processes", Proceedings of 2006 IEEE International Conference on Services Computing, Chicago, Illinois, September 2006, p495-502. [This work won FIRST PRIZE in the IEEE International Services Computing Contest, September 2006]. [Mian et al. 2006] A. Mian, R. Beraldi, and R. Baldoni, "Survey of Service Discovery Protocols in Mobile Ad Hoc Networks", Technical Report - Midlab 7/06, Dip. Informatica e Sistemistica "Antonio Ruberti", Università di Roma "La Sapienza", 2006. [Salatge and Fabre 2006] N. Salatge and J.-C. Fabre, "A Fault Tolerance Support Infrastructure for Web Services based Applications", LAAS Research Report No. 06365, May 2006. RESIST D12 contents i D12 Appendix Contents [Stankovic and Popov 2006] V. Stankovic and P. Popov, "Improving DBMS Performance through Diverse Redundancy", Proceedings of the 25th International Symposium on Reliable Distributed Systems, October 2006. [Veríssimo et al. 2006] P. Verissimo, N. Neves, C. Cachin, J. Poritz, D. Powell, Y. Deswarte, R. Stroud, and I. Welch, “Intrusion-Tolerant Middleware: The Road to Automatic Security”, IEEE Security & Privacy, Vol. 4, No. 4, pp. 54-62, July/August 2006. Part ALGO [Baldoni et al. 2006] R. Baldoni, S. Bonomi, L. Querzoni, A. Rippa, S. Tucci Piergiovanni, A. Virgillito, ”Fighting Erosion in Dynamic Large-Scale Overlay Networks”, Technical Report - Midlab 9/06 , Dip. Informatica e Sistemistica ”Antonio Ruberti”, Universit di Roma ”La Sapienza”, 2006. [Baldoni et al. 2006-07] R. Baldoni, S. Bonomi, L. Querzoni, A. Rippa, S. Tucci Piergiovanni and A. Virgillito, ”Evaluation of Unstructured Overlay Maintenance Protocols under Churn”, IWDDS 2006 co- located with ICDCS2006. [Baldoni et al. 2006-10] R. Baldoni, M. Malek, A. Milani, S. Tucci Piergiovanni, ”Weakly- Persistent Causal Objects In Dynamic Distributed Systems”, To appear in proc. of SRDS 2006, october 2006, Leeds (UK). [Baldoni et al. 2006-11] R. Baldoni, R. Guerraoui, R. Levy, V. Quema, S. Tucci Piergiovanni, ”Unconscious Eventual Consistency with Gossips”, To appear in Proc. of SSS 2006, November 2006, Dallas (USA). [Correia et al., 2006a] Correia, M., Bessani, A. N., Neves, N. F., Lung, L. C., and Ver´ıssimo, P. (2006a). Improving byzantine protocols with secure computational components. In the report. [Courtés et al., 2006] Courtés, L., Killijian, M.-O., and Powell, D. (2006). Storage tradeoffs in a collaborative backup service for mobile devices. In Proceedings of the 6th European Dependable Computing Conference (EDCC-6), number LAAS Report #05673, pages 129–138, Coimbra, Portugal. [Mostefaoui et al. 2006] Mostéfaoui A., Raynal M. and Travers C., Exploring Gafni's reduction aand: from Omega-k to wait-free (2p-p/k)-renaming via set agreement. Proc. 20th Symposium on Distributed Computing (DISC’06), Springer Verlag LNCS #4167, pp. 1-15, Stockholm (Sweden), 2006. [Raynal and Travers 2006] Raynal M. and Travers C., In search of the holy grail: Looking for the weakest failure detector for wait-free set agreement. Invited paper. Proc. 12th Int’l Conference on Principles of Distributed Systems, (OPODIS’06), To appear in Springer Verlag LNCS, 2006. [Ryan and Schneider 2006] P.Y.A. Ryan and S. A. Schneider, Prêt à Voter with Re-encryption Mixes, School of Computing Science Technical Report CS-TR: 956, Newcastle University, 2006. Part SOCIO [Alberdi et al. 2006] Alberdi, E, Ayton, P, Povyakalo, A. A, and Strigini, L. "Automation Bias in Computer Aided Decision Making in Cancer Detection: Implications for System Design". Technical Report, CSR, City University, 2006. 2006. [Barboni et al. 2006a] Barboni, E, Conversy, S, Navarre, D, and Palanque, P. "Model-Based Engineering of Widgets, User Applications and Servers Compliant with ARINC 661 Specification". Proceedings of the 13th RESIST D12 contents ii D12 Appendix Contents conference on Design Specification and Verification of Interactive Systems (DSVIS 2006). 2006. Lecture Notes in Computer Science, Springer Verlag. [Barboni et al. 2006b] Barboni, E, Navarre, D, Palanque, P, and Basnyat, S. "Exploitation of Formal Specification Techniques for ARINC 661 Interactive Cockpit Applications". Proceedings of HCI aero conference, (HCI Aero 2006). 2006. [Basnyat and Palanque 2006] Basnyat, S and Palanque, P. "A Barrier-based Approach for the Design of Safety Critical Interactive Application". ESREL 2006 Safety and Reliability for Managing Risk. Safety and Reliability Conference. 2006. Balkema (Taylor & Francis). [Basnyat et al. Submitted] Basnyat, S, Schupp, B, Palanque, P, and Wright, P. "Formal Socio-Technical Barrier Modelling for Safety-Critical Interactive Systems Design". Special Issue of Safety Science Journal. Submitted. [Bryans et al. 2006] Bryans, J. W, Ryan, P. Y. A, Littlewood, B, and Strigini, L. "E-voting: dependability requirements and design for dependability". First International Conference on Availability, eliability and Security (ARES'06). 988-995. 2006. [Harrison and Loer 2006] Harrison, M. D and Loer, K. "Time as a dimension in the design and analysis of interactive systems". (in preparation). [Harrison et al. 2006] Harrison, M. D, Campos, J. C, Dohery, G, and Loer, K. "Connecting rigorous system analysis to experience centred design". Workshop on Software Engineering Challenges for Ubiquitous Computing. 2006. [Palanque et al. 2006] Palanque, P, Bernhaupt, R, Navarre.D, Ould, M, and Winckler, M. "Supporting Usability Evaluation of Multimodal Man-Machine Interfaces for Space Ground Segment Applications Using Petri net Based Formal Specification”. Ninth International Conference on Space Operations, Rome, Italy, June 18-22, 2006. [Schupp et al. 2006] Schupp, B, S.Basnyat, S, Palanque, P, and Wright, P. A Barrier-Approach to Inform Model-Based Design of Safety-Critical Interactive Systems. 9th International Symposium of the ISSA Research Section Design process and human factors integration: Optimising company performances. 2006. [Sujan and Harrison 2006] Sujan, M and Harrison, M. D. "Investigation of structural properties of hazard mitigation arguments". Analysis of the structure of mitigation arguments and the role of barriers or defences with particular reference to the EUROCONTROL Reduced Vertical Separation Minima Functional Hazard Analysis. 2006. [Sujan et al. 2006a] Sujan, M, Harrison, M. D, Steven, A, Pearson, P. H, and Vernon, S. J. "Demonstration of Safety in Healthcare Organisations". Proceedings SAFECOMP. Springer LNCS. 2006. Part EVAL [Alata et al. 2006] E. Alata, V. Nicomette, M. Kaaniche and M. Dacier, “Lessons learned from the deployment of a high-interaction honeypot”, LAAS_Report 06-331, April 2006. To appear in Proc. Sixth European Dependable Computing Conference (EDCC-6), Coimbra, Portugal, October 18-20, 2006. RESIST D12 contents iii D12 Appendix Contents [Albinet et al. 2007] A. Albinet, J. Arlat and J.-C. Fabre, “Robustness of the Device Driver-Kernel Interface: Application to the Linux Kernel”, LAAS_Report 06-351, May 2006. To appear in Dependability Benchmarking of Computer Systems, (K. Kanoun and L. Spainhower, Eds.), IEEE CS Press, 2007. [Gönczy et al. 2006] L. Gönczy, S. Chiaradonna, F. Di Giandomenico, A. Pataricza, A. Bondavalli, and T. Bartha, “Dependability evaluation of web service-based processes”. In Proc. of European Performance Engineering Workshop (EPEW 2006), LNCS Vol. 4054, pp. 166-180, Springer, 2006. [Kaâniche et al. 2006] M. Kaâniche, E. Alata, V. Nicomette; Y.Deswarte, M. Dacier, “Empirical analysis and statistical modeling of attack processes based on honeypots” WEEDS 2006 - workshop on empirical evaluation of dependability and security (in conjunction with the international conference on dependable systems and networks, (DSN2006), Philadelphia (USA), June 25 - 28, 2006, pp. 119-124. [Kanoun and Crouzet 2006] K. Kanoun and Y. Crouzet, “Dependability Benchmarks for operating Systems”, International Journal of Performability Engineering, Vol. 2, No. 3, July 2006, 275-287. [Kanoun et al. 2007] K. Kanoun, Y. Crouzet, A. Kalakech and A.-E. Rugina, “Windows and Linux Robustness Benchmarks With Respect to Application Erroneous Behavior”, LAAS report, May 2006. To appear in “Dependability Benchmarking of Computer Systems”, (K. Kanoun and L. Spainhower, Eds.), IEEE CS Press, 2007. [Lamprecht et al. 2006] C. Lamprecht, A. van Moorsel, P. Tomlinson and N. Thomas, “Investigating the Efficiency of Cryptographic Algorithms in Online Transactions,” International Journal of Simulation: Systems, Science and Technology, UK Simulation Society, Vol. 7, Issue 2, pp. 63—75, 2006. [Littlewood & Wright 2006] B. Littlewood and D. Wright, “The use of multi-legged arguments to increase confidence in safety claims for software-based systems: a study based on a BBN of an idealised example”, 2006. [Lollini et. al. 2006] P. Lollini, A. Bondavalli, and F. Di Giandomenico, “A general modeling approach and its application to a UMTS network with soft-handover mechanism”, Technical Report RCL060501, University of Firenze, Dip. Sistemi e Informatica, May 2006. [Rugina et al. 2006] A.-E. Rugina, K. Kanoun and M. Kaâniche, “A System Dependability Modeling Framework using AADL and GSPNs”, LAAS-CNRS Report N° 05666, April 2006. [Salako & Strigini 2006] K. Salako and L. Strigini, “Diversity for fault tolerance: effects of "dependence" and common factors in software development", Centre for Software reliability, City University, DISPO project technical report KS DISPO5 01, Sept 2006. Part VERIF [Backes et al. 2006b] M. Backes, B. Pfitzmann, and M. Waidner, “Non-Determinism in Multi-Party Computation”; Workshop on Models for Cryptographic Protocols (MCP 2006), Aarhus, July-August 2006; abstracts as report of ECRYPT (European Network of Excellence in Cryptology, IST-2002-507932). [Backes et al. 2006c] M. Backes, B. Pfitzmann, and M. Waidner, “Soundness Limits of Dolev-Yao Models”; Workshop on Formal and Computational Cryptography (FCC 2006), Venice, July 2006 (no formal proceedings). RESIST D12 contents iv D12 Appendix Contents [Micskei and Majzik 2006] Z. Micskei and I. Majzik, “Model-based Automatic Test Generation for Event- Driven Embedded Systems using Model Checkers,” in Proc. of Dependability of Computer Systems (DepCoS '06), Szklarska Poręba, Poland, pp.192-198, IEEE CS Press, 2006. [Micskei et al. 2006] Z. Micskei, I. Majzik and F. Tam, “Robustness Testing Techniques For High Availability Middleware Solutions,” in Proc. Int. Workshop on Engineering of Fault Tolerant Systems (EFTS 2006), Luxembourg, Luxembourg, 12 - 14 June, 2006. [Pfeifer and von Henke 2006] H. Pfeifer and F. von Henke, “Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture”, Reliability Engineering & System Safety, Special Issue on Safety, Reliability and Security of Industrial Computer Systems, Elsevier Ltd., 2006, to appear. [Serafini et al. 2006] M. Serafini, P. Bokor and N. Suri, “On Exploiting Symmetry to Verify Distributed Protocols”, Fast Abstract, International Conference on Dependable Systems and Networks (DSN) 2006. [Waeselynck et al. 2006] H. Waeselynck, P. Thévenod-Fosse and O. Abdellatif-Kaddour, “Simulated annealing applied to test generation: landscape characterization and stopping criteria”, to appear in Empirical Software Engineering, 2006. RESIST D12 contents v

Description:
Sep 8, 2006 Part Algo – Resilience Algorithms and Mechanisms. algo 18. 2 – On-Line Diagnosis of Transients in Distributed Systems algo 68.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.