J. Arlat, M. Aguera, L. Amat, Y. Crouzet, J.C. Fabre, J.C. Laprie, E. Martins, D. Powell, “Fault injection for dependability validation: a methodology and some applications”, IEEE Transactions on Software Engineering
, Special Issue on Experimental Computer Science, vol. 16, no. 2, Feb. 1990, pp. 166–182CrossRefGoogle Scholar
T.F. Arnold, “The concept of coverage and its effect on the reliability model of repairable systems”, IEEE Trans. on Computers
, vol. C-22, June 1973, pp. 251–254.CrossRefGoogle Scholar
W.G. Bouricius, W.C. Carter, P.R. Schneider, “Reliability Modeling Techniques for Self-Repairing Computer Systems”, Proc. 24th ACM National Conf., 1969, pp. 295–309.
“Computing the Future”, Report of the Committee to Asses the Scope and Direction of Computer Science and Technology of the National Research Council, Communications of ACM, vol. 35, no. 11, Nov. 1992, pp. 30–40.
L. Chen, A. Avizienis, “N-version programming: a fault-tolerance approach to reliability of software operation”, Proc. 8th IEEE Int. Symp. on Fault Tolerant Computing (FTCS-8)
, Toulouse, France, June 1978, pp. 3–9.Google Scholar
G.S. Choi, R.K. Iyer, “FOCUS: an experimental environment for fault sensitivity analysis”, IEEE Trans. on Computers
, vol. 41, no. 12, Dec. 1992, pp. 1515–1526CrossRefGoogle Scholar
R. Cramp, M.A. Vouk, W. Jones, “On operational availability of a large software-based telecommunications system”, Proc. 3rd Int. Symp. on Software Reliability Engineering
, Research Triangle Park, North Carolina, Oct. 1992, pp. 358–366.CrossRefGoogle Scholar
E.A. Davis, P.K. Giloth, “No 4 ESS: performance objectives and service experience”, The Bell System Technical Journal
, vol. 60, no. 6, July–Aug. 1981, pp. 1203–1224.Google Scholar
Y. Deswarte, L. Blain, J.C. Fabre, “Intrusion tolerance in distributed computing systems”, Proc. 1991 IEEE Symposium on Research in Security and Privacy, Oakland (USA), 20–22 Mai 1991, pp.110–121
J.B. Dugan, K.S. Trivedi, “Coverage modeling for dependability analysis of fault-tolerant systems”, IEEE Trans. on Computers
, vol. 38, no. 6, June 1989, pp. 775–787.CrossRefGoogle Scholar
D.E. Eckhardt, A.K. Caglayan, J.C. Knight, L.D. Lee, D.F. McAllister, M.A. Vouk, J.P.J. Kelly, “An experimental evaluation of software redundancy as a strategy for improving reliability”, IEEE Trans. on Software Engineering
, vol. 17, no. 7, July 1991, 692–702.CrossRefGoogle Scholar
Information Technology Security Evaluation Criteria, Provisional Harmonised criteria, Office for Official Publications of the European Communities, June 1991.
W.R. Elmendorf, “Fault-tolerant programming”, Proc. 2nd IEEE Int. Symp. on Fault Tolerant Computing (FTCS-2)
, Newton, Massachusetts, June 1972, pp. 79–83.Google Scholar
M. Gasser, Building a Secure Computer System, Van Nostrand Reinhold, 1988.
J. Gebman, D. McIver, H. Shulman, “Faults with nonstationary observability are limiting avionics R&M”, Proc. 8th AIAA/IEEE Digital Systems Avionics Conf.
, San Jose, California, Oct. 1988, pp. 16–23.Google Scholar
C. Ghezzi, M. Jazayeri, D. Mandrioli, Fundamentals of Software Engineering, Prentice-Hall, 1991
R.L. Glass, “Persistent software errors”, IEEE Transactions on Software Engineering
, vol. SE-7, no. 2, March 1981, pp. 162–168.CrossRefGoogle Scholar
J.N. Gray, “Why do computers stop and what can be done about it?”, Proc. 5th Symp. on Reliability in Distributed Software and Database Systems, Los Angeles, Jan. 1986, pp. 3–12.
J. Gray, “A census of Tandem system availability between 1985 and 1990”, IEEE Trans. on Reliability
, vol. 39, no. 4, Oct. 1990, pp. 409–418.CrossRefGoogle Scholar
U. Gunneflo, J. Karlsson, J. Torin, “Evaluation of error detection schemes using fault injection by heavy-ion radiation”, Proc. 19th IEEE Int. Symp. on Fault Tolerant Computing (FTCS-19), Chicago, June 1989, pp. 340–347.
H. Hecht, H. Dussault, “Correlated failures in fault-tolerant computers”, IEEE Trans. on Reliability
, vol. R-36, no. 2, June 1987, pp. 171–175.CrossRefGoogle Scholar
Y. Huang, C. Kintala, “Software implemented fault tolerance: technologies and experience”, Proc. 23rd IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-23), Toulouse, June 1993, pp. 2–9.
R.K. Iyer, S.E. Butner, E.J. McCluskey, “A statistical failure/load relationship: results of a multi-computer study”, IEEE Trans. on Computers
, vol. C-31, July 1982, pp. 697–706.CrossRefGoogle Scholar
J. Jacob, “The basic integrity theorem”, Prcc. IEEE International Symposium on Security and Privacy, Oakland, May 1991, pp. 89–97.
E. Jonsson, T. Olovsson, “On the Integration of Security and Dependability in Computer Systems”, Proc. IASTED Int. Conf. for Reliability, Quality Control and Risk Assessment, 1992.
M.K. Joseph, A. Avizienis, “A fault tolerance approach to computer viruses”, Proc. 1988 Symp. on Security and Privacy, Oakland, April 1988, pp. 52–58.
K. Kanoun, T. Sabourin, “Software dependability of a telephone switching system”, Proc. 17th IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-17), Pittsburgh, Pennsylvania, USA, June 1987, pp. 236–241.
B. Kuipers, “Commonsense reasoning about causality: deriving behavior from structure”, in Qualitative Reasoning about Physical Systems, D.G. Bobrow editor, MIT Press, 1985, pp. 169–203.
J.C. Laprie, J. Arlat, C. Beounes, K. Kanoun, “Definition and analysis of hardware- and software-fault-tolerant architectures”, IEEE Computer
, vol. 23, no. 7, July 1990, pp. 39–51.CrossRefGoogle Scholar
J.C. Laprie, ed., Dependability: Basic Concepts and Terminology
, Springer-Verlag, Vienna, 1992.MATHGoogle Scholar
J.C. Laprie, “Dependability: a unifying concept for reliable, safe, secure computing”, Proc. 12th IFIP World Computer Congress
, Madrid, Spain, Sept. 1992, vol. I, pp. 585–593Google Scholar
J.C. Laprie, “For a product-in-a-process approach to software reliability evaluation”, Proc. 3rd Int. Symp. on Software Reliability Engineering, Research Triangle Park, NC, Oct. 1992, pp. 134–139.
R.A. Maxion, “Towards fault-tolerant user interfaces”, Proc. 5th IFAC Workshop on Safety of Computer Control Systems (SAFECOMP’86), Sarlat, France, Oct. 1986, pp. 117–122.
D.A. Norman, “Design rules based on analyses of human error”, Communications of the ACM
, vol. 26, no. 4, April 1983, pp. 254–258.MathSciNetCrossRefGoogle Scholar
D.L. Parnas, A.J. van Schouwen, S.P. Kwan, “Evaluation of safety-critical software”, Communications of the ACM
, vol. 33, no. 4, June 1990, pp. 636–648.CrossRefGoogle Scholar
D. Powell, “Failure Mode Assumptions and Assumption Coverage”, Proc. 22nd IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-22), Boston, July 1992, pp.386–395.
M.O. Rabin, “Efficient dispersal of information for security, load balancing and fault tolerance”, Jounal of the ACM
, vol. 36, no. 2, April 1989, pp. 335–348.MathSciNetMATHCrossRefGoogle Scholar
B. Randell, “System Structure for Software Fault Tolerance”, IEEE Trans. on Software Engineering
, vol. SE-1, no. 2, 1975, pp.220–232,.Google Scholar
W.B. Rouse, N.M. Morris, “Conceptual design of a human error tolerant interface for complex engineering systems”, Automatica
, vol. 23, no. 2, 1987, pp. 231–235.CrossRefGoogle Scholar
D.P. Siewiorek, R.S. Swarz, The Theory and Practice of Reliable System Design, Digital Press, 1992.
P. Thévenod-Fosse, H. Waeselynck, “An investigation of statistical software testing”, Journal of Software Testing, Verification and Reliability
, vol. 1, no. 2, 1991, pp. 5–25.Google Scholar
W.N. Toy, “Fault-tolerant design of local ESS processors”, Proceedings of the IEEE
, vol. 66, no. 19, Oct. 1978, pp. 1126–1145.CrossRefGoogle Scholar
U. Voges, ed., Application of design diversity in computerized control systems
, Springer Verlag, Vienna, 1988.Google Scholar
C. Wild, S. Zeil, G. Feng, “Employing accumulated knowledge to refine test descriptions”, Software Testing, Verification and Reliability
, vol. 2, no. 2, July 1992, pp. 53–68.CrossRefGoogle Scholar