International audienceThe paper is aimed at examining the relationship between the three topics of the workshops that gave rise to this book: security, fault tolerance, and software assurance. Those three topics can be viewed CIS different facets of dependability. The paper focuses on diversity, as a desirable approach for addressing the classes of faults that underlay all these topics, i.e., design faults and intrusion faults
Intellectual diversity – difference – has long been used in human affairs to minimise the impact of ...
Dependability is that property of a computer system such that reliance can justifiably be place on t...
As software dominates most discussions in the information technology business, one needs to carefull...
International audienceThe paper is aimed at examining the relationship between the three topics of t...
Early experiments with software diversity in the mid 1970's investigated N-version programming and r...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
This paper is devoted to an overview of software fault tolerance by means of design diversity, i.e. ...
International audienceThe idea that diverse or dissimilar computations could be used to detect error...
Various methods have been proposed for building faulttolerant software in an effort to provide subst...
The goal of this research was to explore first principles associated with mixing of diverse implemen...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
This report examines the state of the field of software fault tolerance. Terminology, techniques for...
Intellectual diversity – difference – has long been used in human affairs to minimise the impact of ...
Dependability is that property of a computer system such that reliance can justifiably be place on t...
As software dominates most discussions in the information technology business, one needs to carefull...
International audienceThe paper is aimed at examining the relationship between the three topics of t...
Early experiments with software diversity in the mid 1970's investigated N-version programming and r...
Early experiments with software diversity in the mid 1970’s investigated N-version programming and r...
Building secure, inviolable systems using traditional mechanisms is becoming increasingly an unattai...
This paper is devoted to an overview of software fault tolerance by means of design diversity, i.e. ...
International audienceThe idea that diverse or dissimilar computations could be used to detect error...
Various methods have been proposed for building faulttolerant software in an effort to provide subst...
The goal of this research was to explore first principles associated with mixing of diverse implemen...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct b...
The security gains of intrusion-tolerant systems are directly dependent on the assumption that syste...
This report examines the state of the field of software fault tolerance. Terminology, techniques for...
Intellectual diversity – difference – has long been used in human affairs to minimise the impact of ...
Dependability is that property of a computer system such that reliance can justifiably be place on t...
As software dominates most discussions in the information technology business, one needs to carefull...