You are previewing Dependability and Computer Engineering.
O'Reilly logo
Dependability and Computer Engineering

Book Description

Dependability and Computer Engineering: Concepts for Software-Intensive Systems offers a state-of-the-art overview of the dependability research, from engineering various software-intensive systems to validating existing IT-frameworks and solving generic and particular problems related to the dependable use of IT in our society. It is important to understand how dependability is manifested in software-intensive systems, how it is developed, and how it can be enhanced at various levels in systems and organizations. This book uncovers the existing research on the topic as well as the key challenges associated with the engineering of dependable IT systems in the future.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  5. Preface
    1. Objective
    2. Origins
    3. Target Audience
    4. Potential
    5. Overview
  6. Acknowledgment
  7. Section 1: Modeling for Dependability
    1. Chapter 1: Towards a Holistic Approach to Fault Management
      1. Abstract
      2. INTRODUCTION
      3. WHEELS WITHIN A WHEEL: A NESTED APPROACH
      4. SIX REAL-WORLD EXAMPLES
      5. CONCLUSION
    2. Chapter 2: Exceptions for Dependability
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. UNDEFINEDNESS IN EXPRESSIONS
      5. WEAKEST PRECONDITIONS
      6. WEAKEST EXCEPTIONAL PRECONDITIONS
      7. DERIVED STATEMENTS
      8. CORRECTNESS ASSERTIONS
      9. PATTERNS OF EXCEPTION USE
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
    3. Chapter 3: Network Availability for Distributed Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. THE MODELING FRAMEWORK
      4. MODELING FUNCTIONAL PROPERTIES
      5. REFINEMENT
      6. NETWORK AVAILABILITY WITH MIDAS
      7. REFINEMENT IMPLICATIONS
      8. RELATED WORK
      9. CONCLUSION
  8. Section 2: Ensuring Dependability
    1. Chapter 4: Formal Stepwise Development of Scalable and Reliable Multiagent Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND: EVENT-B
      4. SYSTEM MODEL
      5. REFINEMENT STEPS OF THE DEVELOPMENT
      6. RELATED WORKS
      7. FUTURE WORK
      8. CONCLUSION
    2. Chapter 5: Development of Safety-Critical Control Systems in Event-B Using FMEA
      1. Abstract
      2. INTRODUCTION
      3. RELATED WORK
      4. MODELLING CONTROL SYSTEMS IN EVENT-B
      5. INCORPORATION OF FAULT ANALYSIS RESULTS IN EVENT-B
      6. CASE STUDY
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    3. Chapter 6: Towards Designing FPGA-Based Systems by Refinement in B
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. PATTERNS FOR MODELLING FPGA-BASED SYSTEMS IN EVENT-B
      5. CONCLUSION AND RELATED WORK
    4. Chapter 7: Online Testing of Nondeterministic Systems with the Reactive Planning Tester
      1. Abstract
      2. INTRODUCTION
      3. PRELIMINARIES OF ON-LINE TESTING WITH MODEL-BASED PLANNING
      4. SYNTHESIS OF ON-LINE PLANNING TESTER FOR FSM MODELS OF IUT
      5. PERFORMANCE EVALUATION OF RPT USING CASE STUDY EXPERIMENTS
      6. EXTENDING THE REACTIVE PLANNING TESTER FOR EFSM MODELS OF IUT
      7. CONCLUSION AND FUTURE WORK
    5. Chapter 8: Development of Controllers Using Simulink and Contract-Based Design
      1. Abstract
      2. Introduction
      3. OVERVIEW OF SIMULINK AND CONTRACT-BASED DESIGN
      4. Conclusion
  9. Section 3: Security Fundamentals
    1. Chapter 9: Modeling Security Goals and Software Vulnerabilities
      1. Abstract
      2. Introduction
      3. SECURITY GOAL MODELS
      4. Conclusion
    2. Chapter 10: A Method for Model-Driven Information Flow Security
      1. Abstract
      2. INTRODUCTION
      3. Part I: A METHOD FOR MODEL-DRIVEN INFORMATION FLOW SECURITY
      4. PART II: FORMAL FOUNDATION
      5. EVENT TRANSFORMATIONS
      6. RELATED WORK
      7. CONCLUSION AND FUTURE WORK
    3. Chapter 11: Security of Dependable Systems
      1. Abstract
      2. Introduction
      3. Background
      4. System Security
      5. Future Research Directions
      6. Conclusion
  10. Section 4: Applied Security
    1. Chapter 12: Application Security for Mobile Devices1
      1. Abstract
      2. Introduction
      3. Credential-Based Trust Models
      4. Static Verification
      5. Runtime Monitoring
      6. European Projects
      7. Discussion
      8. Conclusion
    2. Chapter 13: Supporting Software Evolution for Open Smart Cards by Security-by-Contract
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. SECURITY-BY-CONTRACT FOR SMART CARDS
      5. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    3. Chapter 14: SecInvest
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND: CHALLENGES IN SECURITY INVESTMENT AND WHY IT IS SO HARD
      4. MAIN FOCUS OF THE CHAPTER: SECURITY INVEST TRADE-OFF ANALYSIS
      5. Discussion
      6. Related Work
      7. Conclusion and Future Research Directions
      8. APPENDIX
  11. Section 5: Analysis of Risks and Dependability
    1. Chapter 15: Using Model-Driven Risk Analysis in Component-Based Development
      1. ABSTRACT
      2. Introduction
      3. Background
      4. Component-Based Risk Analysis and Development
      5. Requirements
      6. Interfaces and their Assets
      7. Interactions
      8. Specification
      9. Related Work
      10. Conclusion and Discussion
    2. Chapter 16: Uncertainty Handling in Weighted Dependency Trees
      1. Abstract
      2. INTRODUCTION
      3. weighted dependency trees and uncertainty
      4. the RESEARCH METHOD
      5. THE EVALUATION criteria
      6. The high-level evaluation
      7. The Low-Level Evaluation
      8. conclusion
      9. Appendix A
      10. APPENDIX b
      11. Appendix c
    3. Chapter 17: Measuring the Progress of a System Development
      1. Abstract
      2. Introduction
      3. Formal Development
      4. Graphical Representation of System Development
      5. Refinement Patterns
      6. Metrics and Measures
      7. Measures for Refinement Patterns and Progress Diagrams
      8. The State of the Art: Literature Review
      9. Conclusions and Future Research Directions
    4. Chapter 18: Dependability Assessment of Two Network Supported Automotive Applications
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. the PLATOONING application
      5. The Virtual black-box application
      6. CONCLUSION AND FuTURE rESEARCH dIRECTIONS
    5. Chapter 19: Quantitative Reasoning About Dependability in Event-B
      1. Abstract
      2. INTRODUCTION
      3. Introduction to Event-B
      4. Stochastic modeling in Event-B
      5. From Event-B to Probabilistic Model Checking
      6. Case Study
      7. Conclusion
  12. Dependability and Computer Engineering:Concepts for Software-Intensive SystemsCompilation of References
  13. About the Contributors
  14. Index