Joong-Sup Choi

  • Citations Per Year
Learn More
In many mission-critical applications, important services should be maintained properly under any circumstances including the presence of compromised components incurred by outside intentional attacks. In the paper, a two-level approach for the intrusion tolerance is presented. At the node level, by means of dynamic resource reallocation within a computing(More)
This paper presents an approach to developing Realtime Dependable Systems (RDSs) based on a real-time object model. A system development process can be divided into two phases, that is, Specijication Phase and Construction Phase. In the Specification Phase, especially for an RDS, system requirements are decomposed into a group of Real-Time Objects (RTOs)(More)
  • 1