Dependability of Critical Computer Systems


Book Description

M. CARPENTIER Director General DG XIII, Telecommunications, Information Industries and Innovation of the Commission of the European Communities It is with great pleasure that I introduce and recommend this collection of guidelines produced by EWICS TC7. This Technical Committee has consistently attracted technical experts of high quality from all over Europe and the standard of the Committee's work has reflected this. The Committee has been sponsored by the Commission of the European Communities since 1978. During this period, there has been the opportunity to observe the enthusiasm and dedication in the activities of the group, the expertise and effort invested in its work, the discipline in meeting objectives and the quality of the resulting guidelines. It is no surprise that these guidelines have influenced the work of international standardisation bodies. Now the first six of EWICS TCTs guidelines are being made available as a book. I am convinced that all computer system developers who use them will greatly enhance their chances of achieving quality systems. v Acknowledgements In the preparation of this book, the editoLisgrateful to P. Bishop, G. Covington II, C. Goring, and W. Quirk for their help in editing the guidelines. In addition, he would like to thank S. Bologna, W. Ehrenberger, M. Ould, J. Rata, L. Sintonen and J. Zalewski for reviewing the chapters and providing additional material.




Dependability of Critical Computer Systems 1


Book Description

M. CARPENTIER Director General DG XIII, Telecommunications, Information Industries and Innovation of the Commission of the European Communities It is with great pleasure that I introduce and recommend this collection of guidelines produced by EWICS TC7. This Technical Committee has consistently attracted technical experts of high quality from all over Europe and the standard of the Committee's work has reflected this. The Committee has been sponsored by the Commission of the European Communities since 1978. During this period, there has been the opportunity to observe the enthusiasm and dedication in the activities of the group, the expertise and effort invested in its work, the discipline in meeting objectives and the quality of the resulting guidelines. It is no surprise that these guidelines have influenced the work of international standardisation bodies. Now the first six of EWICS TCTs guidelines are being made available as a book. I am convinced that all computer system developers who use them will greatly enhance their chances of achieving quality systems. v Acknowledgements In the preparation of this book, the editoLisgrateful to P. Bishop, G. Covington II, C. Goring, and W. Quirk for their help in editing the guidelines. In addition, he would like to thank S. Bologna, W. Ehrenberger, M. Ould, J. Rata, L. Sintonen and J. Zalewski for reviewing the chapters and providing additional material.




Dependable Computer Systems


Book Description

Dependability analysis is the recent approach to performance evaluation of contemporary systems which tries to cope with new challenges that are brought with their unprecedented complexity, size and diversity. Especially in case of computer systems and networks such evaluation must be based on multidisciplinary approach to theory, technology, and maintenance of systems which operate in real (and very often unfriendly) environments. As opposed to “classic” reliability which focuses mainly on technical aspects of system functioning, dependability studies investigate the systems as multifaceted and sophisticated amalgamations of technical, information and also human resources. This monograph presents selected new developments in such areas of dependability research as mathematical models, evaluation of software, probabilistic assessment, methodologies, tools, and technologies. Intelligent and soft computing methods help to resolve fundamental problems of dependability analysis which are caused by the fact that in contemporary computer systems it is often difficult to find a relation between system elements and system events (the relation between reasons and results) and it is even more difficult to define strict mathematical models with “analytical” relationships between such phenomena.







Safety-critical Computer Systems


Book Description

Increasingly microcomputers are being used in applications where their correct operation is vital to ensure the safety of the public and the environment: from anti-lock braking systems in automobiles, to fly-by-wire aircraft, to shut-down systems at nuclear power plants. It is, therefore, vital that engineers be aware of the safety implications of the systems they develop. This book is an introduction to the field of safety-critical computer systems written for any engineer who uses microcomputers within real-time embedded systems. It assumes no prior knowledge of safety, or of any specific computer hardware or programming language. This text is intended for both engineering and computer science students, and for practising engineers within computer related industries. The approach taken is equally suited to engineers who consider computers from a hardware, software or systems viewpoint.




Dependable Computing Systems


Book Description

A team of recognized experts leads the way to dependable computing systems With computers and networks pervading every aspect of daily life, there is an ever-growing demand for dependability. In this unique resource, researchers and organizations will find the tools needed to identify and engage state-of-the-art approaches used for the specification, design, and assessment of dependable computer systems. The first part of the book addresses models and paradigms of dependable computing, and the second part deals with enabling technologies and applications. Tough issues in creating dependable computing systems are also tackled, including: * Verification techniques * Model-based evaluation * Adjudication and data fusion * Robust communications primitives * Fault tolerance * Middleware * Grid security * Dependability in IBM mainframes * Embedded software * Real-time systems Each chapter of this contributed work has been authored by a recognized expert. This is an excellent textbook for graduate and advanced undergraduate students in electrical engineering, computer engineering, and computer science, as well as a must-have reference that will help engineers, programmers, and technologists develop systems that are secure and reliable.




Fault Injection Techniques and Tools for Embedded Systems Reliability Evaluation


Book Description

This is a comprehensive guide to fault injection techniques used to evaluate the dependability of a digital system. The description and the critical analysis of different fault injection techniques and tools are authored by key scientists in the field of system dependability and fault tolerance.




Computer Safety, Reliability and Security


Book Description

The European Commission emphasizes, in its Fifth Research Framework, the “. . . emerging generic dependability requirements in the information society, stemming both from the ubiquity and volume of embedded and networked systems and services as well as from the global and complex nature of large scale information and communication infrastructures, from citizens, administrations and business in terms of technologies, tools, systems, applications and services". The series of Conference on Computer Safety, Reliability, and Security (Safecomp) contributes to satisfy these requirements by reviewing the state of the art, experiences, and new trends in the relevant scientific and industrial areas. Safecomp is intended to be a platform for technology transfer among academia, industry, and research institutions, providing the opportunity for exchange of ideas, opinions, and visions among experts. This year Safecomp celebrates the 20th anniversary, its first Conference having been organized in Stuttgart by EWICS (European Workshop on Industrial Computer Systems) in 1979, and we hope these Proceedings will contribute to the celebration by supporting Safecomp aims. The Proceedings include the 25 papers that have been presented orally at the Conference and the full version of the 14 papers that have been presented as posters, all of which were selected from 76 submissions. Papers almost uniformly take up Safecomp topics, dealing with the issues of Safety Assessment and Human Factors, Verification and Validation, Design for Safety, Formal Methods, and Security.




Computer Safety, Reliability, and Security


Book Description

This book constitutes the refereed proceedings of the 26th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2007. The 33 revised full papers and 16 short papers are organized in topical sections on safety cases, impact of security on safety, fault tree analysis, safety analysis, security aspects, verification and validation, platform reliability, reliability evaluation, formal methods, static code analysis, safety-related architectures.




Theory and Applications of Dependable Computer Systems


Book Description

This book presents selected papers from the Fifteenth International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX), which illustrate the diversity of theoretical problems in analysis of performability, reliability and security of contemporary computer systems. Covering also methodologies and practical tools involved in this field, it is a valuable reference resource for scientists, researchers, practitioners and students who are dealing with these subjects. Established in 2006, DepCoS-RELCOMEX is an annual conference series organised by Wrocław University of Science and Technology. It focuses on the dependability and performability of contemporary computer systems – topics that can provide solutions to new challenges in evaluation of their reliability and efficiency. Since they are probably the most complex technical systems ever engineered by humans, the organization of modern computer systems cannot be modelled and analysed solely as structures (however complex and distributed) built only on the basis of technical resources. Instead they should be considered as a unique blend of interacting people (their needs and behaviours), networks (together with mobile properties, iCloud organisation, Internet of Everything) and a large number of users dispersed geographically and producing an unimaginable number of applications. This new, interdisciplinary approach is developing a continually increasing range of methods which apply also the latest findings in artificial intelligence (AI) and computational intelligence (CI).