Advertisement

Architecting Critical Systems

First International Symposium, ISARCS 2010, Prague, Czech Republic, June 23-25, 2010 Proceedings

  • Holger Giese
Conference proceedings ISARCS 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6150)

Table of contents

  1. Front Matter
  2. Design

    1. Vittorio Cortellessa, Catia Trubiani, Leonardo Mostarda, Naranker Dulay
      Pages 1-18
    2. Atef Mohamed, Mohammad Zulkernine
      Pages 19-32
    3. Ricardo J. Rodríguez, José Merseguer
      Pages 33-51
    4. Tobias Eckardt, Stefan Henkler
      Pages 52-71
  3. Verification and Validation

    1. J. Paul Gibson, Eric Lallet, Jean-Luc Raffy
      Pages 89-108
    2. Piotr Gawkowski, Konrad Grochowski, Maciej Ławryńczuk, Piotr Marusak, Janusz Sosnowski, Piotr Tatjewski
      Pages 109-124
  4. Domain-Specific Results

    1. Michael N. Gagnon, John Truelove, Apu Kapadia, Joshua Haines, Orton Huang
      Pages 125-141
    2. Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
      Pages 161-178
  5. Standards

    1. Martin Hillenbrand, Matthias Heinz, Nico Adler, Klaus D. Müller-Glaser, Johannes Matheis, Clemens Reichmann
      Pages 179-192
  6. Back Matter

About these proceedings

Introduction

Architecting critical systems has gained major importance in commercial, g- ernmentalandindustrialsectors. Emergingsoftwareapplicationsencompasscr- icalities that are associated with either the whole system or some of its com- nents. Therefore, e?ective methods, techniques, and tools for constructing, te- ing, analyzing, and evaluating the architectures for critical systems are of major importance. Furthermore, these methods, techniques and tools must address - sues of dependability and security, while focusing not only on the development, but also on the deployment and evolution of the architecture. This newly established ISARCS symposium provided an exclusive forum for exchanging views on the theory and practice for architecting critical systems. Such systems are characterized by the perceived severity of consequences that faults or attacks may cause, and architecting them requires appropriate means to assure that they will ful?ll their speci?ed services in a dependable and secure manner. The di?erent attributes of dependability and security cannot be considered in isolation for today’s critical systems, as architecting critical systems ess- tially means to ?nd the right trade-o? among these attributes and the various other requirements imposed on the system. This symposium therefore brought together the four communities working on dependability, safety, security and testing/analysis, each addressing to some extent the architecting of critical s- tems from their speci?c perspective. To this end the symposium united the following three former events: – Workshop on Architecting Dependable Systems (WADS) – Workshop on the Role of Software Architecture for Testing and Analysis (ROSATEA) – Workshop on Views on Designing Complex Architectures.

Keywords

ARC Overlay Standards algorithms applications architecture design fault tolerance modeling operating system privacy security structured analysis validation verification

Editors and affiliations

  • Holger Giese
    • 1
  1. 1.Hasso Plattner Institute for Software Systems EngineeringPotsdamGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-13556-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-13555-2
  • Online ISBN 978-3-642-13556-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site