My Account Log in

1 option

Architecting Critical Systems : First International Symposium, Prague, Czech Republic, June 23-25, 2010 / edited by Holger Giese.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024)
Format:
Book
Contributor:
Giese, Holger, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 6150.
Security and Cryptology ; 6150
Language:
English
Subjects (All):
Computer networks.
Computers, Special purpose.
Data encryption (Computer science).
Application software.
Computers and civilization.
Algorithms.
Computer Communication Networks.
Special Purpose and Application-Based Systems.
Cryptology.
Information Systems Applications (incl. Internet).
Computers and Society.
Algorithm Analysis and Problem Complexity.
Local Subjects:
Computer Communication Networks.
Special Purpose and Application-Based Systems.
Cryptology.
Information Systems Applications (incl. Internet).
Computers and Society.
Algorithm Analysis and Problem Complexity.
Physical Description:
1 online resource (205 pages) : 82 illustrations.
Edition:
First edition 2010.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
System Details:
text file PDF
Summary:
Architecting critical systems has gained major importance in commercial, governmental, and industrial sectors. Emerging software applications encompass practicalities that are associated with either the whole system or some of its components. Therefore, effective methods, techniques, and tools for constructing, testing, analyzing, and evaluating the architectures for critical systems are of major importance. Furthermore, these methods, techniques, and tools must address issues of dependability and security, while focusing not only on the development, but also on the deployment and evolution of the architecture. This newly established ISARCS symposium provided an exclusive forum for exchanging views on the theory and practice for architecting critical systems. Such systems are characterized by the perceived severity of consequences that faults or attacks may cause, and architecting them requires appropriate means to assure that they will fulfill their specified services in a dependable and secure manner. The different attributes of dependability and security cannot be considered in isolation for today's critical systems, as architecting critical systems essentially means finding the right trade-off among these attributes and the various other requirements imposed on the system. This symposium therefore brought together the four communities working on dependability, safety, security, and testing/analysis, each addressing to some extent the architecting of critical systems from their specific perspective. To this end, the symposium united the following three former events: the Workshop on Architecting Dependable Systems (WADS); the Workshop on the Role of Software Architecture for Testing and Analysis (ROSATEA); and the Workshop on Views on Designing Complex Architectures.
Contents:
Design
An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance
Architectural Design Decisions for Achieving Reliable Software Systems
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Component Behavior Synthesis for Critical Systems,
Verification and Validation
A Road to a Formally Verified General-Purpose Operating System
Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirements
Testing Fault Robustness of Model Predictive Control Algorithms
Domain-Specific Results
Towards Net-Centric Cyber Survivability for Ballistic Missile Defense
A Safety Case Approach to Assuring Configurable Architectures of Safety-Critical Product Lines
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Standards
ISO/DIS 26262 in the Context of Electric and Electronic Architecture Modeling.
Other Format:
Printed edition:
ISBN:
978-3-642-13556-9
9783642135569
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account