The use of several distinct recovery procedures is one of the techniques that can be used to ensure high availability and fault-tolerance of computer systems. This method has been...
Sergiy A. Vilkomir, David Lorge Parnas, Veena B. M...
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
In this paper, we begin by laying out our motivation for exploring methods of evaluating Ambient Information Systems, with a strong push toward in-situ studies. Next, we describe ...
William R. Hazlewood, Kay Connelly, Kevin Makice, ...
Survivability is a crucial property for computer systems that support critical infrastructures of our society. A variety of survivability definitions and evaluation methods for t...
Modern distributed industrial control systems need improvements in their dependability. In this paper we study the dependability of a fault tolerant distributed industrial control ...