Model checking is indispensable in the development of modern digital circuitry and is emerging as a valuable instrument for software verification. Model checking has uncovered errors in a variety of software-intensive systems, including spacecraft redundancy management, aircraft collision avoidance, and weapons control systems. The approach offers the potential to help ensure behavioral properties and eliminate catastrophic errors in software systems that require high levels of dependability.
{"title":"Model Checking for Dependable Software-Intensive Systems","authors":"E. Clarke, M. Fujita, D. Gluch","doi":"10.1109/DSN.2003.10001","DOIUrl":"https://doi.org/10.1109/DSN.2003.10001","url":null,"abstract":"Model checking is indispensable in the development of modern digital circuitry and is emerging as a valuable instrument for software verification. Model checking has uncovered errors in a variety of software-intensive systems, including spacecraft redundancy management, aircraft collision avoidance, and weapons control systems. The approach offers the potential to help ensure behavioral properties and eliminate catastrophic errors in software systems that require high levels of dependability.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"20 1","pages":"764"},"PeriodicalIF":0.0,"publicationDate":"2003-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77089702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dependable systems are supposed to satisfy an ensemble of distinct properties, namely safety, security and availability, to name a few. These properties are in parts complementary and also diverse enough to have spawned complete topic areas of their own. Consequently, work on achieving and validating the different properties has partly been performed in different communities and with varied nuances. Maybe most prominently this is true for the two areas of fault-tolerant systems on the one hand and secure systems (especially cryptography) on the other. For example, researchers in fault-tolerance often make statements about systems by treating cryptographic primitives as black boxes. This is done to simplify analysis and (sometimes) avoid number and probability theory. However, by abstracting away the basic properties of the cryptographic primitives, this severely constrains the ability to conduct rigorous security proofs. Various examples of the past show that by over-abstraction, important attributes got neglected, contributing to attack vulnerabilities in the resultant protocols. But despite these examples, many researchers have confirmed that there are strong similarities between the ways of modeling and handling uncertainty in both areas.
{"title":"PoDSy 2003: Principles of Dependable Systems","authors":"F. Freiling, K. Kursawe, L. Buttyán","doi":"10.1109/DSN.2003.10002","DOIUrl":"https://doi.org/10.1109/DSN.2003.10002","url":null,"abstract":"Dependable systems are supposed to satisfy an ensemble of distinct properties, namely safety, security and availability, to name a few. These properties are in parts complementary and also diverse enough to have spawned complete topic areas of their own. Consequently, work on achieving and validating the different properties has partly been performed in different communities and with varied nuances. Maybe most prominently this is true for the two areas of fault-tolerant systems on the one hand and secure systems (especially cryptography) on the other. For example, researchers in fault-tolerance often make statements about systems by treating cryptographic primitives as black boxes. This is done to simplify analysis and (sometimes) avoid number and probability theory. However, by abstracting away the basic properties of the cryptographic primitives, this severely constrains the ability to conduct rigorous security proofs. Various examples of the past show that by over-abstraction, important attributes got neglected, contributing to attack vulnerabilities in the resultant protocols. But despite these examples, many researchers have confirmed that there are strong similarities between the ways of modeling and handling uncertainty in both areas.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"40 1","pages":"763"},"PeriodicalIF":0.0,"publicationDate":"2003-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82954138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The DSN Workshop on Self-Stabilization’s programme includes fifteen research presentations. The main areas in the programme are network protocols, sensor networks, distributed algorithms, methods for analysis of self-stabilization, distributed system fault tolerance, and techniques used in the construction of systems that self-
{"title":"Self-Stabilization Workshop","authors":"Shing-Tsaan Huang, T. Herman","doi":"10.1109/DSN.2003.10003","DOIUrl":"https://doi.org/10.1109/DSN.2003.10003","url":null,"abstract":"The DSN Workshop on Self-Stabilization’s programme includes fifteen research presentations. The main areas in the programme are network protocols, sensor networks, distributed algorithms, methods for analysis of self-stabilization, distributed system fault tolerance, and techniques used in the construction of systems that self-","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"18 1","pages":"766"},"PeriodicalIF":0.0,"publicationDate":"2003-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80944256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As systems become increasingly connected to an increasingly diverse set of other systems and environments, architects will lose their ability to intricately plan interactions among system components, because an increasing fraction of those interactions will be with foreign and possibly unanticipated systems or components. Humans will be increasingly less competent to install, configure, optimize, maintain, and merge massive, complex, and heterogeneous computing systems. They will not be able to make sufficiently quick, decisive responses to a rapid stream of changing and conflicting demands.
{"title":"First Workshop on the Design of Self-Managing Systems","authors":"Lisa Spainhower, A. Moorsel","doi":"10.1109/DSN.2003.10000","DOIUrl":"https://doi.org/10.1109/DSN.2003.10000","url":null,"abstract":"As systems become increasingly connected to an increasingly diverse set of other systems and environments, architects will lose their ability to intricately plan interactions among system components, because an increasing fraction of those interactions will be with foreign and possibly unanticipated systems or components. Humans will be increasingly less competent to install, configure, optimize, maintain, and merge massive, complex, and heterogeneous computing systems. They will not be able to make sufficiently quick, decisive responses to a rapid stream of changing and conflicting demands.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"17 1","pages":"765"},"PeriodicalIF":0.0,"publicationDate":"2003-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82509679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dependability of E-Commerce Systems","authors":"Lisa Spainhower, N. Bowen, S. Hunter","doi":"10.1109/DSN.2002.10008","DOIUrl":"https://doi.org/10.1109/DSN.2002.10008","url":null,"abstract":"","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"3 1","pages":"788-789"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87162067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
While middleware technologies, such as CORBA, EJB and DCOM, are gaining adoption is most application domains, there is still some reluctance in deploying middleware in mission-critical systems with high dependability requirements. Recognizing the need for dependable middleware, several research, industrial and standardization efforts have focussed independently on specific pieces of this dependability puzzle, but have not collectively attempted to solve the entire puzzle. One specific objective of this one-day Workshop is to bring together the leading researchers and practitioners (and therefore, the pieces of the puzzle) in this area, to discuss their insights on dependable middleware, along with the open issues and the challenges that they still face. To this end, some of the presentations at WDMS 2002 will cover practical experiences with, and lessons learned in using and testing, dependable middleware in the field; yet other presentations will uncover novel research ideas that are on the cutting edge in the design and implementation of dependable middleware. Because there is an equally increasing need for middleware-based systems to exhibit, in addition to dependability, many other ”-ilities” (such as survivability, adaptability, scalability, availability, mobility, security, real-time, etc.), another objective of this Workshop is to look at the composition of various other interesting ”-ilities” with dependability. Our exciting technical program covers a range of issues in dependable middleware, and consists of 16 high-quality papers (selected from a collection of 26 submissions, after review by the WDMS 2002 Program Committee) organized into four sessions. Some of the presentations are aimed specifically at discussing the marriage of real-time with dependability, live upgrades with dependability, etc. We expect that future research on reliable middleware will be founded on some of the ideas that will be presented at this Workshop, and those that will inevitably arise from the discussions that follow. In keeping with the true open spirit of a Workshop, WDMS 2002 is intended to serve as a forum for fostering freespirited technical exchanges and healthy debate. Practitioners from industry and researchers from academia will present their latest practices, ideas, technologies, standards and systems for building dependable middleware-based applications. These presentations will set the stage for the Workshop participants to explore, collectively, ways of making today’s middleware technologies more robust, and to investigate the enhancement of existing dependable middleware with other ”-ilities”.
{"title":"Workshop on Dependable Middleware-Based Systems","authors":"P. Narasimhan, P. Felber","doi":"10.1109/DSN.2002.10011","DOIUrl":"https://doi.org/10.1109/DSN.2002.10011","url":null,"abstract":"While middleware technologies, such as CORBA, EJB and DCOM, are gaining adoption is most application domains, there is still some reluctance in deploying middleware in mission-critical systems with high dependability requirements. Recognizing the need for dependable middleware, several research, industrial and standardization efforts have focussed independently on specific pieces of this dependability puzzle, but have not collectively attempted to solve the entire puzzle. One specific objective of this one-day Workshop is to bring together the leading researchers and practitioners (and therefore, the pieces of the puzzle) in this area, to discuss their insights on dependable middleware, along with the open issues and the challenges that they still face. To this end, some of the presentations at WDMS 2002 will cover practical experiences with, and lessons learned in using and testing, dependable middleware in the field; yet other presentations will uncover novel research ideas that are on the cutting edge in the design and implementation of dependable middleware. Because there is an equally increasing need for middleware-based systems to exhibit, in addition to dependability, many other ”-ilities” (such as survivability, adaptability, scalability, availability, mobility, security, real-time, etc.), another objective of this Workshop is to look at the composition of various other interesting ”-ilities” with dependability. Our exciting technical program covers a range of issues in dependable middleware, and consists of 16 high-quality papers (selected from a collection of 26 submissions, after review by the WDMS 2002 Program Committee) organized into four sessions. Some of the presentations are aimed specifically at discussing the marriage of real-time with dependability, live upgrades with dependability, etc. We expect that future research on reliable middleware will be founded on some of the ideas that will be presented at this Workshop, and those that will inevitably arise from the discussions that follow. In keeping with the true open spirit of a Workshop, WDMS 2002 is intended to serve as a forum for fostering freespirited technical exchanges and healthy debate. Practitioners from industry and researchers from academia will present their latest practices, ideas, technologies, standards and systems for building dependable middleware-based applications. These presentations will set the stage for the Workshop participants to explore, collectively, ways of making today’s middleware technologies more robust, and to investigate the enhancement of existing dependable middleware with other ”-ilities”.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"61 1","pages":"792-793"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80486738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workshop on Dependability and Robotics","authors":"R. Chatila, J. Laprie","doi":"10.1109/DSN.2002.10010","DOIUrl":"https://doi.org/10.1109/DSN.2002.10010","url":null,"abstract":"","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"536 1","pages":"787"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75001523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A system that can continue critical operations, perhaps in a degraded mode, in the face of a partially successful cyber attack can be termed “intrusion tolerant.” The workshop will provide a forum for the presentation and discussion of current efforts to develop subsystems and systems that display some degree of intrusion tolerance. The workshop will also provide the opportunity for demonstrations of some experimental prototype intrusion tolerant systems. The goal of the workshop is to have a critical and productive discussion of the state of current research and development efforts in the area of intrusion tolerant systems and to identify promising directions for future research in the area.
{"title":"Intrusion Tolerant Systems Workshop","authors":"C. Landwehr, S. Bellovin","doi":"10.1109/DSN.2002.10015","DOIUrl":"https://doi.org/10.1109/DSN.2002.10015","url":null,"abstract":"A system that can continue critical operations, perhaps in a degraded mode, in the face of a partially successful cyber attack can be termed “intrusion tolerant.” The workshop will provide a forum for the presentation and discussion of current efforts to develop subsystems and systems that display some degree of intrusion tolerance. The workshop will also provide the opportunity for demonstrations of some experimental prototype intrusion tolerant systems. The goal of the workshop is to have a critical and productive discussion of the state of current research and development efforts in the area of intrusion tolerant systems and to identify promising directions for future research in the area.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"17 1","pages":"785-786"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78917739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Classical features such as raw performance and functionality have long driven the computer industry to improve their products. But now, dependability and maintainability are seen as equally important. While there are relatively straightforward ways to evaluate and compare performance and functionality of different systems or components, the evaluation of dependability and maintainability features is much more difficult. Among the challenges that must be addressed are: incorporating the effects of software failures, characterizing the dependability of opaque off-the-shelf hardware and software components, including the effects of typical maintenance, operational, and configuration management procedures, and accommodating the fact that different application areas have different requirements for the various factors influencing dependability. The goal of the Dependability Benchmarking Workshop is to provide a forum for the computer industry and academia to discuss problems associated with the evaluation and characterization of dependability and maintainability of components and computer systems. The identification of dependability benchmarking measures and the essential technologies for dependability benchmarking, including both experimental measuring and modeling technologies, are central aspects of this large discussion meant to garner ideas on practical and cost-effective ways to evaluate dependability and maintainability features. This workshop is the outcome of the first two years of
{"title":"Workshop on Dependability Benchmarking","authors":"P. Koopman, H. Madeira","doi":"10.1109/DSN.2002.10006","DOIUrl":"https://doi.org/10.1109/DSN.2002.10006","url":null,"abstract":"Classical features such as raw performance and functionality have long driven the computer industry to improve their products. But now, dependability and maintainability are seen as equally important. While there are relatively straightforward ways to evaluate and compare performance and functionality of different systems or components, the evaluation of dependability and maintainability features is much more difficult. Among the challenges that must be addressed are: incorporating the effects of software failures, characterizing the dependability of opaque off-the-shelf hardware and software components, including the effects of typical maintenance, operational, and configuration management procedures, and accommodating the fact that different application areas have different requirements for the various factors influencing dependability. The goal of the Dependability Benchmarking Workshop is to provide a forum for the computer industry and academia to discuss problems associated with the evaluation and characterization of dependability and maintainability of components and computer systems. The identification of dependability benchmarking measures and the essential technologies for dependability benchmarking, including both experimental measuring and modeling technologies, are central aspects of this large discussion meant to garner ideas on practical and cost-effective ways to evaluate dependability and maintainability features. This workshop is the outcome of the first two years of","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"95 1","pages":"790-791"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80285037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable, Uniterruptible Computin","authors":"D. Avresky","doi":"10.1109/DSN.2002.10004","DOIUrl":"https://doi.org/10.1109/DSN.2002.10004","url":null,"abstract":"","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"124 1","pages":"794"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74483236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}