Abstract
The word “dependability” has been introduced by Laprie [Laprie1985] as a generic concept subsuming such system characteristics as reliability, availability, safety, and security. The usefulness of such a neutral word is shown by the realization that it leads to the discovery of interesting analogies. For example, Dobson and Randell [Dobson1986] advocate a new approach to secure system design based on considering security and reliability (concepts that are usually thought to be distinct) as different special cases of dependability. But as has been argued by a number of authors [Nessett1986, Chalmers1986], concentration on formal aspects of dependability fails to capture many of the real problems of achieving dependability in practice. Many current formal models do not make allowance for dependability factors related to the management of systems by more than one jurisdictive authority, for example. Nor do the models formally recognize the multiplicity of roles played by people in the overall scheme of the system operating in its environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
R. Carnap, Foundations of Logic and Mathematics, University of Chicago Press (1939).
L. S. Chalmers, “An Analysis of the Differences between the Computer Security Practices in the Military and Private Sectors”, Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 71-74, Oakland, California, April 1986.
D. E. Denning, “Secure Databases and Safety: Some Unexpected Conflicts”, Proceedings of the 1986 CSR Safety and Security Symposium, ed. T. Anderson, Blackwell Scientific, Oxford (in preparation).
J. E. Dobson and B. Randell, “Building Reliable Secure Computing Systems out of Unreliable Insecure Components”, Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 187-193, Oakland, California, April 1986.
P. C. Humphreys, “Levels of Representation of Decision Problems”, Journal of Applied Systems Analysis, vol. 11, pp. 3–22, 1984.
R. Kemmerer, “Shared Resource Matrix Methodology”, ACM Transactions on Computer Systems, vol. 1(3), pp. 256–277, August 1983.
J.-C. Laprie, “Dependable Computing and Fault Tolerance”, 15th IEEE International Conference on Fault-Tolerant Computing, pp. 2-11, Ann Arbor, Michigan, June 1985.
D. M. Nessett, “Factors Affecting Distributed System Security”, Proceedings of the 1986 IEEE Symposium on Security and Privacy, pp. 204-222, Oakland, California, April 1986.
J. Piaget, The Development of Thought, Blackwell, Oxford (1978).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1989 Crown Copyright and Pitman Publishing
About this chapter
Cite this chapter
Dobson, J. (1989). Modelling real-world issues for dependable software. In: Sennett, C.T. (eds) High-Integrity Software. Software Science and Engineering. Springer, Boston, MA. https://doi.org/10.1007/978-1-4684-5775-9_11
Download citation
DOI: https://doi.org/10.1007/978-1-4684-5775-9_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4684-5777-3
Online ISBN: 978-1-4684-5775-9
eBook Packages: Springer Book Archive