Basic concepts and taxonomy of dependable and secure computing

@article{Avizienis2004BasicCA,
  title={Basic concepts and taxonomy of dependable and secure computing},
  author={Algirdas Avizienis and J. Laprie and Brian Randell and Carl E. Landwehr},
  journal={IEEE Transactions on Dependable and Secure Computing},
  year={2004},
  volume={1},
  pages={11-33}
}
This paper gives the main definitions relating to dependability, a generic concept including a special case of such attributes as reliability, availability, safety, integrity, maintainability, etc. Security brings in concerns for confidentiality, in addition to availability and integrity. Basic definitions are given first. They are then commented upon, and supplemented by additional definitions, which address the threats to dependability and security (faults, errors, failures), their attributes… Expand
A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability
TLDR
This paper presents a systematic approach for determining common and complementary characteristics of five widely-used concepts, dependability, fault-tolerance, reliability, security, and survivability. Expand
Network Dependability, Fault-tolerance, Reliability, Security, Survivability: A Framework for Comparative Analysis
TLDR
This paper presents a systematic approach for determining common and complementary characteristics of five widely-used concepts, dependability, fault-tolerance, reliability, security, and survivability. Expand
Towards an integrated conceptual model of security and dependability
  • E. Jonsson
  • Computer Science
  • First International Conference on Availability, Reliability and Security (ARES'06)
  • 2006
TLDR
This position paper suggests a high-level conceptual model that is aimed to give a novel approach to the area of security and dependability and to provide an overall means for finding and applying fundamental defense mechanisms. Expand
Fundamentals of Dependability
TLDR
This chapter studies three fundamental characteristics of dependability: attributes, impairment, and means. Expand
MODIFIED, COMPLEMENTED TAXONOMY OF FAULTS IN FAULT-TOLERANT REAL-TIME SYSTEMS
TLDR
Authors present complemented fault taxonomy for fault-tolerant real-time systems to eliminate inconsistencies and to unify existing fault taxonomies. Expand
Comparing reliability and security: Concepts, requirements, and techniques
TLDR
The relationship between reliability engineering and security engineering for software products is explored and the similarities and differences in approaches taken within the communications domain for reliability and security are explored. Expand
Comparing reliability and security: Concepts, requirements, and techniques
Design of highly secure systems is increasingly important. This paper explores the relationship between reliability engineering and security engineering for software products. Our work has indicatedExpand
Security of Dependable Systems
TLDR
This chapter explores the challenges of security and dependability in the development process and provides some directions toward their solutions. Expand
Dependability and Security Models * (Keynote Paper)
TLDR
This paper presents a new classification of dependability and security models, and presents several individual model types such as availability, confidentiality, integrity, performance, reliability, survivability, safety and maintainability. Expand
A Framework for Predicting Security and Dependability Measures in Real-time
TLDR
This thesis proposes a stochastic modeling approach, which can be used to predict a system’s security and dependability behavior, and has a number of possible applications. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 120 REFERENCES
DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY
  • J. Laprie
  • Engineering, Computer Science
  • Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'.
  • 1995
This paper provides a concepeual framework for expressing the attributes of what constitutes dependable and reliable computing: the impairrnents to dependability: faults, errors, and failures, theExpand
Dependability — Its Attributes, Impairments and Means
This paper gives the main definitions relating to dependability, a generic concept including as special cases such atributes as reliability, availability, safety, security, maintainability. TheExpand
Failure mode assumptions and assumption coverage
  • D. Powell
  • Computer Science
  • [1992] Digest of Papers. FTCS-22: The Twenty-Second International Symposium on Fault-Tolerant Computing
  • 1992
TLDR
Assumption coverage is shown to be extremely important in systems requiring very high dependability and it is shown that the need to increase system redundancy to accommodate more severe modes of component failure can sometimes result in a decrease in dependability. Expand
Probabilistic Validation of Intrusion Tolerance 1
TLDR
The main measure of security is application-level availability, which is defined as a measure of correct delivery of service with respect to the alternation of correct and incorrect service, and the goal of creating a sound scientific basis for comparing alternative intrusion tolerance approaches quantitatively, and estimating the intrusion tolerance of particular approaches. Expand
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering
TLDR
A simple and fast solution is proposed that nevertheless ensures a high level of file security and authenticity that is based on the concept of fault- and intrusion-tolerance rather than avoidance techniques. Expand
Data security
The need for computer security has grown every year since the creation of computer systems, but yet with such a high demand, there are many systems that are, by no means, adecuetly protected.ThisExpand
Modeling and quantification of security attributes of software systems
TLDR
This paper deals with various issues related to quantifying the security attribute of an intrusion tolerant system, such as the SITAR system, which is modeled as a random process to capture the attacker behavior as well as the system's response to a security intrusion. Expand
An Adaptive Intrusion-Tolerant Server Architecture
We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionallyExpand
Survivable Network Systems: An Emerging Discipline
Abstract : Society is growing increasingly dependent upon large scale, highly distributed systems that operate in unbounded network environments. Unbounded networks, such as the Internet, have noExpand
Fault Tolerance Terminology Proposals
TLDR
The terms fault, error and failure are carefully defined and distinguished in the hope that an agreed terminology will emerge in the fault tolerance community. Expand
...
1
2
3
4
5
...