Diversity against accidental and deliberate faults

The paper is aimed at examining the relationship between the three topics of the workshops that gave rise to this book: security, fault tolerance, and software assurance. Those three topics can be viewed as different facets of dependability. The paper focuses on diversity, as a desirable approach for addressing the classes of faults that underlay all these topics, i.e., design faults and intrusion faults.

[1]  Khaled El Emam,et al.  The repeatability of code defect classifications , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Heinz Kantz,et al.  The ELEKTRA railway signalling system: field experience with an actively replicated system with diversity , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[4]  Mladen A. Vouk Software Reliability Engineering , 1999 .

[5]  Algirdas Avizienis,et al.  The N-Version Approach to Fault-Tolerant Software , 1985, IEEE Transactions on Software Engineering.

[6]  Rodolphe Ortalo,et al.  Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..

[7]  Michael K. Reiter,et al.  Distributing trust with the Rampart toolkit , 1996, CACM.

[8]  Liming Chen,et al.  N-VERSION PROGRAMMINC: A FAULT-TOLERANCE APPROACH TO RELlABlLlTY OF SOFTWARE OPERATlON , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..

[9]  EhrlichWilla,et al.  Determining the Cost of a Stop-Test Decision , 1993 .

[10]  Barry W. Boehm,et al.  Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.

[11]  Michael Diaz,et al.  How Software Process Improvement Helped Motorola , 1997, IEEE Softw..

[12]  Werner Schütz,et al.  DEDIX 87 — A Supervisory System for Design Diversity Experiments at UCLA , 1988 .

[13]  John D. Musa,et al.  Best current practice of SRE , 1996 .

[14]  Mikio Aoyama Concurrent-development process model , 1993, IEEE Software.

[15]  Eric Pilaud,et al.  An experience of a critical software development , 1990, [1990] Digest of Papers. Fault-Tolerant Computing: 20th International Symposium.

[16]  H. Kopetz,et al.  The Evolution of Fault-Tolerant Computing , 1987, Dependable Computing and Fault-Tolerant Systems.

[17]  Gunnar Hagelin ERICSSON Safety System for Railway Control , 1988 .

[18]  Peter G. Bishop,et al.  PODS — A project on diverse software , 1986, IEEE Transactions on Software Engineering.

[19]  Karama Kanoun Cost of software design diversity an empirical evaluation , 1999, Proceedings 10th International Symposium on Software Reliability Engineering (Cat. No.PR00443).

[20]  Brian Randell,et al.  System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.

[21]  Raymond Dion,et al.  Process improvement and the corporate balance sheet , 1993, IEEE Software.

[22]  Marc Dacier,et al.  Privilege Graph: an Extension to the Typed Access Matrix Model , 1994, ESORICS.

[23]  Jean Arlat,et al.  Architectural Issues in Software Fault Tolerance , 1995 .

[24]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[25]  Marilyn W. Bush Getting started on metrics-Jet Propulsion Laboratory productivity and quality , 1990, [1990] Proceedings. 12th International Conference on Software Engineering.

[26]  Algirdas Avizienis,et al.  A fault tolerance approach to computer viruses , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[27]  Watts S. Humphrey,et al.  Managing the software process , 1989, The SEI series in software engineering.

[28]  Udo Voges,et al.  Use of Diversity in Experimental Reactor Safety Systems , 1988 .

[29]  Jean Arlat,et al.  Definition and analysis of hardware- and software-fault-tolerant architectures , 1990, Computer.

[30]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[31]  Willa K. Ehrlich,et al.  Determining the cost of a stop-test decision (software reliability) , 1993, IEEE Software.

[32]  Jim Gray,et al.  Why Do Computers Stop and What Can Be Done About It? , 1986, Symposium on Reliability in Distributed Software and Database Systems.

[33]  Algirdas Avizienis,et al.  Fault Tolerance by Design Diversity: Concepts and Experiments , 1984, Computer.

[34]  Peter A. Barrett,et al.  Software Fault Tolerance: An Evaluation , 1985, IEEE Transactions on Software Engineering.