메뉴 건너뛰기




Volumn 3069, Issue , 2004, Pages 51-78

Achieving critical system survivability through software architectures

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 35048863443     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (26)

References (54)
  • 1
    • 0007803468 scopus 로고    scopus 로고
    • WAFT: Support for Fault-Tolerance in Wide-Area Object Oriented Systems
    • IEEE Computer Society Press, Los Alamitos, CA, October
    • Alvisi, L. and K. Marzullo. "WAFT: Support for Fault-Tolerance in Wide-Area Object Oriented Systems." Proc. 2nd Information Survivability Workshop, IEEE Computer Society Press, Los Alamitos, CA, October 1998.
    • (1998) Proc. 2nd Information Survivability Workshop
    • Alvisi, L.1    Marzullo, K.2
  • 2
    • 0017913718 scopus 로고
    • Safe programming
    • Anderson, T., and R. W. Witty. "Safe programming." BIT 18:1-8, 1978.
    • (1978) BIT , vol.18 , pp. 1-8
    • Anderson, T.1    Witty, R.W.2
  • 5
    • 0012242179 scopus 로고
    • On Group Communication in Large-Scale Distributed Systems
    • January
    • Babaoglu, O. and A. Schiper. "On Group Communication in Large-Scale Distributed Systems." ACM Operating Systems Review 29(1):62-67, January 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.1 , pp. 62-67
    • Babaoglu, O.1    Schiper, A.2
  • 6
    • 1542288257 scopus 로고    scopus 로고
    • Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries
    • San Francisco CA, June
    • Backes, M. and C. Cachin. "Reliable Broadcast In A Computational Hybrid Model With Byzantine Faults, Crashes, And Recoveries" International Conference on Dependable Systems and Networks, San Francisco CA, June 2003
    • (2003) International Conference on Dependable Systems and Networks
    • Backes, M.1    Cachin, C.2
  • 7
    • 0027810202 scopus 로고
    • The Process Group Approach to Reliable Distributed Computing
    • December
    • Birman, K. "The Process Group Approach to Reliable Distributed Computing." Communications of the ACM, 36(12):37-53 and 103, December 1993.
    • (1993) Communications of the ACM , vol.36 , Issue.12 , pp. 37-53
    • Birman, K.1
  • 8
    • 0029214107 scopus 로고
    • Safety Kernels: Specification and Implementation
    • Burns, A., and A. J. Wellings. "Safety Kernels: Specification and Implementation." High Integrity Systems 1(3):287-300, 1995.
    • (1995) High Integrity Systems , vol.1 , Issue.3 , pp. 287-300
    • Burns, A.1    Wellings, A.J.2
  • 10
    • 0026104130 scopus 로고
    • Understanding Fault-Tolerant Distributed Systems
    • February
    • Cristian, F. "Understanding Fault-Tolerant Distributed Systems." Communications of the ACM 34(2):56-78, February 1991.
    • (1991) Communications of the ACM , vol.34 , Issue.2 , pp. 56-78
    • Cristian, F.1
  • 13
  • 14
    • 0011998335 scopus 로고    scopus 로고
    • Federal Aviation Administration Advisory Circular 25.1309-1A
    • Federal Aviation Administration Advisory Circular 25.1309-1A, "System Design and Analysis."
    • System Design and Analysis
  • 15
  • 16
    • 0345415768 scopus 로고    scopus 로고
    • Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous Environments
    • March
    • Gartner, Felix C. "Fundamentals of Fault-Tolerant Distributed Computing in Asynchronous Environments." A CM Computing Surveys 31(1):1-26, March 1999.
    • (1999) A CM Computing Surveys , vol.31 , Issue.1 , pp. 1-26
    • Gartner Felix, C.1
  • 18
    • 4243454421 scopus 로고    scopus 로고
    • Summaries of Four Critical Infrastructure Systems
    • Department of Computer Science, University of Virginia, November
    • Knight, J., M. Elder, J. Flinn, and P. Marx. "Summaries of Four Critical Infrastructure Systems." Technical Report CS-97-27, Department of Computer Science, University of Virginia, November 1997.
    • (1997) Technical Report CS-97-27
    • Knight, J.1    Elder, M.2    Flinn, J.3    Marx, P.4
  • 20
    • 84942246436 scopus 로고    scopus 로고
    • Towards a Rigorous Definition of Information System Survivability
    • Washington, DC, April
    • Knight, J. C., E. A. Strunk and K. J. Sullivan. "Towards a Rigorous Definition of Information System Survivability." DISCEX 2003, Washington, DC, April 2003.
    • (2003) DISCEX 2003
    • Knight, J.C.1    Strunk, E.A.2    Sullivan, K.J.3
  • 23
    • 0002856604 scopus 로고
    • Structuring Parallel and Distributed Programs
    • March
    • Magee, J., N. Dulay and J. Kramer. "Structuring Parallel and Distributed Programs." Software Engineering Journal, 8(2):73-82, March 1993.
    • (1993) Software Engineering Journal , vol.8 , Issue.2 , pp. 73-82
    • Magee, J.1    Dulay, N.2    Kramer, J.3
  • 25
    • 0032025572 scopus 로고    scopus 로고
    • Surviving Network Partitioning
    • March
    • Melliar-Smith, P., and L. Moser. "Surviving Network Partitioning." IEEE Computer 31(3):62-68, March 1998.
    • (1998) IEEE Computer , vol.31 , Issue.3 , pp. 62-68
    • Melliar-Smith, P.1    Moser, L.2
  • 26
    • 0019047765 scopus 로고
    • On Evaluating the Performability of Degradable Computing Systems
    • August
    • Myers, J.F. "On Evaluating The Performability Of Degradable Computing Systems." IEEE Transactions on Computers 29(8):720-731, August 1980.
    • (1980) IEEE Transactions on Computers , vol.29 , Issue.8 , pp. 720-731
    • Myers, J.F.1
  • 28
    • 33845665127 scopus 로고    scopus 로고
    • A Product Family Based Approach to Graceful Degradation
    • Paderborn, Germany, October
    • Nace, W., and P. Koopman. "A Product Family Based Approach to Graceful Degradation." DIPES 2000, Paderborn, Germany, October 2000.
    • (2000) DIPES 2000
    • Nace, W.1    Koopman, P.2
  • 29
    • 0036472463 scopus 로고    scopus 로고
    • Requirements-based Monitors for Real-time Systems
    • Feb.
    • Peters, D. K., and D. L. Parnas. "Requirements-based Monitors for Real-time Systems." IEEE Trans. on Software Engineering 28(2):146-158, Feb. 2002.
    • (2002) IEEE Trans. on Software Engineering , vol.28 , Issue.2 , pp. 146-158
    • Peters, D.K.1    Parnas, D.L.2
  • 34
    • 0012297608 scopus 로고
    • Kernels for Safety?
    • T. Anderson Ed., Blackwell Scientific Publications
    • Rushby, J. "Kernels for Safety?" Safe and Secure Computing Systems, T. Anderson Ed., Blackwell Scientific Publications, 1989.
    • (1989) Safe and Secure Computing Systems
    • Rushby, J.1
  • 36
    • 35048870151 scopus 로고    scopus 로고
    • An Automated Defense System to Counter Internet Worms
    • Department of Computer Science, University of Virginia, March
    • Scandariato, Riccardo and John C. Knight. "An Automated Defense System to Counter Internet Worms." Technical Report CS-2004-12, Department of Computer Science, University of Virginia, March 2004.
    • (2004) Technical Report CS-2004-12
    • Scandariato, R.1    Knight, J.C.2
  • 37
    • 84976815497 scopus 로고    scopus 로고
    • Fail-stop processors: An approach to designing fault-tolerant computing systems
    • Schlichting, R. D., and F. B. Schneider. "Fail-stop processors: An approach to designing fault-tolerant computing systems." ACM Transactions on Computing Systems 1(3):222-238.
    • ACM Transactions on Computing Systems , vol.1 , Issue.3 , pp. 222-238
    • Schlichting, R.D.1    Schneider, F.B.2
  • 38
    • 0035394327 scopus 로고    scopus 로고
    • Using Simplicity to Control Complexity
    • Sha, L. "Using Simplicity to Control Complexity." IEEE Software 18(4):20-28, 2001.
    • (2001) IEEE Software , vol.18 , Issue.4 , pp. 20-28
    • Sha, L.1
  • 39
    • 0004911634 scopus 로고
    • A Software Architecture for Dependable and Evolvable Industrial Computing Systems
    • Software Engineering Institute, Carnegie Mellon University
    • Sha, L., R. Rajkumar and M. Gagliardi. "A Software Architecture for Dependable and Evolvable Industrial Computing Systems." Technical Report CMU/SEI-95-TR-005, Software Engineering Institute, Carnegie Mellon University, 1995.
    • (1995) Technical Report CMU/SEI-95-TR-005
    • Sha, L.1    Rajkumar, R.2    Gagliardi, M.3
  • 46
    • 35048826249 scopus 로고    scopus 로고
    • U.S. Department of Commerce, National Telecommunications and Information Administration, Institute for Telecommunications Services, Federal Std. 1037C
    • U.S. Department of Commerce, National Telecommunications and Information Administration, Institute for Telecommunications Services, Federal Std. 1037C.
  • 48
    • 0030130161 scopus 로고    scopus 로고
    • Horus: A Flexible Group Communications System
    • April
    • van Renesse, R., K. Birman, and S. Maffeis. "Horus: A Flexible Group Communications System." Comm. of the ACM 39(4):76-83, April 1996.
    • (1996) Comm. of the ACM , vol.39 , Issue.4 , pp. 76-83
    • Van Renesse, R.1    Birman, K.2    Maffeis, S.3
  • 50
    • 33746780102 scopus 로고    scopus 로고
    • Astrolabe: A Robust and Scalable Technology for Distributed System Monitoring, Management, and Data Mining
    • May
    • Van Renesse, R., K. Birman and W. Vogels. "Astrolabe: A Robust and Scalable Technology for Distributed System Monitoring, Management, and Data Mining." ACM Transactions on Computer Systems, Vol. 21, No. 2, pp. 164-206, May 2003.
    • (2003) ACM Transactions on Computer Systems , vol.21 , Issue.2 , pp. 164-206
    • Van Renesse, R.1    Birman, K.2    Vogels, W.3
  • 51
    • 33748697823 scopus 로고    scopus 로고
    • Intrusion-Tolerant Architectures: Concepts and Design (extended)
    • Department of Computer Science, University of Lisboa
    • Veríssimo, P., Neves, N.F., and Correia, M. "Intrusion-Tolerant Architectures: Concepts and Design (extended)." Technical Report DI/FCUL TR03-5, Department of Computer Science, University of Lisboa, 2003
    • (2003) Technical Report DI/FCUL TR03-5
    • Veríssimo, P.1    Neves, N.F.2    Correia, M.3
  • 54
    • 79956071190 scopus 로고    scopus 로고
    • COCA: A Secure Distributed Online Certification Authority
    • (J. Lala Ed.), IEEE Computer Society Press
    • Zhou, L., F. Schneider and R. Renesse. "COCA: A Secure Distributed Online Certification Authority." in OASIS: Foundations of Intrusion Tolerant Systems (J. Lala Ed.), IEEE Computer Society Press, 2003.
    • (2003) OASIS: Foundations of Intrusion Tolerant Systems
    • Zhou, L.1    Schneider, F.2    Renesse, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.