2004
DOI: 10.1109/tdsc.2004.40
|View full text |Cite
|
Sign up to set email alerts
|

Effective fault treatment for improving the dependability of COTS and legacy-based applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2005
2005
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 28 publications
0
14
0
Order By: Relevance
“…This is not a requirement of many intrusion-tolerant systems, but it is definitely of importance for unattended operation, as is desired of the control part of CII. -Trustworthiness monitoring to perform surveillance of the coverage stability of the system, that is, of whether it is still performing inside the assumed fault envelope or beyond assumptions made [2]. In the latter case, dependable adaptation mechanisms are triggered to stabilize coverage and thus, the operational guarantees.…”
Section: Key Architecture Aspectsmentioning
confidence: 99%
See 1 more Smart Citation
“…This is not a requirement of many intrusion-tolerant systems, but it is definitely of importance for unattended operation, as is desired of the control part of CII. -Trustworthiness monitoring to perform surveillance of the coverage stability of the system, that is, of whether it is still performing inside the assumed fault envelope or beyond assumptions made [2]. In the latter case, dependable adaptation mechanisms are triggered to stabilize coverage and thus, the operational guarantees.…”
Section: Key Architecture Aspectsmentioning
confidence: 99%
“…Extended analyzes about parameter tuning are available in [3] while applications and variants are described in [2] [18]. Probabilistic diagnosis.…”
Section: Monitored Component (Mc)mentioning
confidence: 99%
“…Automated diagnosis in COTS systems: Automated diagnosis for black-box distributed COTS components is addressed in [32], [33]. The system model has replicated COTS application components, whose outputs are voted on and the replicas which differ from the majority are considered suspect.…”
Section: Debugging In Distributed Applicationsmentioning
confidence: 99%
“…One of the innovative aspects of this work, further to intrusion tolerance, is the resilience aspect, approached through two paradigms: proactive-resilience to achieve exhaustion-safety [9], to ensure perpetual, non-stop operation despite the continuous production of faults and intrusions; and trustworthiness monitoring to perform surveillance of the coverage stability of the system, that is, of whether it is still performing inside the assumed fault envelope or beyond assumptions made [2]. In the latter case, dependable adaptation mechanisms are triggered.…”
Section: Crutial Architecturementioning
confidence: 99%