Dependability: from Concepts to Limits

Our society is faced with an ever increasing dependence on computing systems, which lead to question ourselves about the limits of their dependability. In order to respond this question, a global conceptual and terminological framework is needed, which is first given. The analysis of the limits in dependability which is then conducted identifies design faults as the major limiting factor, a consequence of which is the concluding recommendation of applying a fault tolerance approach to the improvement of the production process.

[1]  Hélène Waeselynck,et al.  An investigation of statistical software testing , 1991, Softw. Test. Verification Reliab..

[2]  Donald A. Norman,et al.  Design rules based on analyses of human error , 1983, CACM.

[3]  Jim Gray,et al.  A census of Tandem system availability between 1985 and 1990 , 1990 .

[4]  Ravishankar K. Iyer,et al.  FOCUS: An Experimental Environment for Fault Sensitivity Analysis , 1992, IEEE Trans. Computers.

[5]  Juris Hartmanis Computing the future: committee to assess the scope and direction of computer science and technology for the National Research Council , 1992, CACM.

[6]  David F. McAllister,et al.  An Experimental Evaluation of Software Redundancy as a Strategy For Improving Reliability , 1991, IEEE Trans. Software Eng..

[7]  Mladen A. Vouk,et al.  On operational availability of a large software-based telecommunications system , 1992, [1992] Proceedings Third International Symposium on Software Reliability Engineering.

[8]  David Powell Failure mode assumptions and assumption coverage , 1992 .

[9]  Robert S. Swarz,et al.  The theory and practice of reliable system design , 1982 .

[10]  Yennun Huang,et al.  Software Implemented Fault Tolerance Technologies and Experience , 1993, FTCS.

[11]  Jean Arlat,et al.  Definition and analysis of hardware- and software-fault-tolerant architectures , 1990, Computer.

[12]  Tomas Olovsson,et al.  On the Integration of Security and Dependability in Computer Systems , 1992 .

[13]  Algirdas Avizienis,et al.  A fault tolerance approach to computer viruses , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[14]  R. A. Maxion,et al.  Toward Fault-Tolerant User Interfaces , 1986 .

[15]  Thomas F. Arnold,et al.  The Concept of Coverage and Its Effect on the Reliability Model of a Repairable System , 1973, IEEE Transactions on Computers.

[16]  Jean Arlat,et al.  Fault Injection for Dependability Validation: A Methodology and Some Applications , 1990, IEEE Trans. Software Eng..

[17]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[18]  Jeremy L. Jacob The basic integrity theorem , 1991, Proceedings Computer Security Foundations Workshop IV.

[19]  Hermann Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992 .

[20]  Jean Gebman,et al.  Faults with nonstationary observability are limiting avionics R&M , 1988 .

[21]  Johan Karlsson,et al.  Evaluation of error detection schemes using fault injection by heavy-ion radiation , 1989, [1989] The Nineteenth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[22]  Brian Randell System structure for software fault tolerance , 1975 .

[23]  William B. Rouse,et al.  Conceptual design of a human error tolerant interface for complex engineering systems , 1987, Autom..

[24]  Jean-Claude Laprie For a product-in-a-process approach to software reliability evaluation , 1992, [1992] Proceedings Third International Symposium on Software Reliability Engineering.

[25]  Morrie Gasser,et al.  Building a Secure Computer System , 1988 .

[26]  David Lorge Parnas,et al.  Evaluation of safety-critical software , 1990, CACM.

[27]  Ravishankar K. Iyer,et al.  A Statistical Failure/Load Relationship: Results of a Multicomputer Study , 1982, IEEE Transactions on Computers.

[28]  Robert L. Glass,et al.  Persistent Software Errors , 1981, IEEE Transactions on Software Engineering.

[29]  J. Hartmains,et al.  Computing the future , 1992 .

[30]  Herbert Hecht,et al.  Correlated Failures in Fault-Tolerant Computers , 1987, IEEE Transactions on Reliability.

[31]  Gao Feng,et al.  Employing accumulated knowledge to refine test descriptions , 1992, Softw. Test. Verification Reliab..

[32]  P. K. Giloth,et al.  NO. 4 ESS: performance objectives and service experience , 1981, The Bell System Technical Journal.

[33]  Jean-Claude Laprie,et al.  Dependability: A Unifying Concept for Reliable, Safe, Secure Computing , 1992, IFIP Congress.

[34]  Kishor S. Trivedi,et al.  Coverage Modeling for Dependability Analysis of Fault-Tolerant Systems , 1989, IEEE Trans. Computers.

[35]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[36]  W.N. Toy,et al.  Fault-tolerant design of local ESS processors , 1978, Proceedings of the IEEE.

[37]  W. C. Carter,et al.  Reliability modeling techniques for self-repairing computer systems , 1969, ACM '69.

[38]  Benjamin Kuipers,et al.  Commonsense Reasoning about Causality: Deriving Behavior from Structure , 1984, Artif. Intell..

[39]  Robert S. Swarz,et al.  INTRODUCTION TO THE PRACTICE OF RELIABLE SYSTEM DESIGN , 1992 .

[40]  Jim Gray,et al.  Why Do Computers Stop and What Can Be Done About It? , 1986, Symposium on Reliability in Distributed Software and Database Systems.