[图书][B] Normal accidents: Living with high risk technologies-Updated edition

C Perrow - 2011 - books.google.com
Normal Accidents analyzes the social side of technological risk. Charles Perrow argues that
the conventional engineering approach to ensuring safety--building in more warnings and …

Evolve or die: High-availability design principles drawn from googles network infrastructure

R Govindan, I Minei, M Kallahalla, B Koley… - Proceedings of the 2016 …, 2016 - dl.acm.org
Maintaining the highest levels of availability for content providers is challenging in the face
of scale, network evolution and complexity. Little, however, is known about failures large …

[图书][B] Distributed systems: an algorithmic approach

S Ghosh - 2006 - taylorfrancis.com
Most applications in distributed computing center around a set of common subproblems.
Distributed Systems: An Algorithmic Approach presents the algorithmic issues and …

How to systematically classify computer security intrusions

U Lindqvist, E Jonsson - … on Security and Privacy (Cat. No …, 1997 - ieeexplore.ieee.org
This paper presents a classification of intrusions with respect to the technique as well the
result. The taxonomy is intended to be a step on the road to an established taxonomy of …

Model-driven engineering for mission-critical iot systems

F Ciccozzi, I Crnkovic, D Di Ruscio, I Malavolta… - IEEE …, 2017 - ieeexplore.ieee.org
Mission-critical Internet of Things (MC-IoT) systems involve heterogeneous things from both
the digital and physical worlds. They run applications whose failure might cause significant …

[PDF][PDF] Quality attribute workshops (QAWS)

MR Barbacci, R Ellison, AJ Lattanze, JA Stafford… - 2003 - resources.sei.cmu.edu
Abstract The Quality Attribute Workshop (QAW) is a facilitated method that engages system
stakeholders early in the life cycle to discover the driving quality attributes of a software …

Sources of failure in the public switched telephone network

DR Kuhn - Computer, 1997 - ieeexplore.ieee.org
What makes a distributed system reliable? A study of failures in the US public switched
telephone network (PSTN) shows that human intervention is one key to this large system's …

[图书][B] Software architecture for product families: principles and practice

M Jazayeri, A Ran, F Van Der Linden… - 2000 - academia.edu
Mehdi Jazayeri, ACM Ran, Frank Van Der Linden, Alexander Ran Software development
organizations are now discovering the efficiencies that can be achieved by architecting …

Software engineering for safety: a roadmap

RR Lutz - Proceedings of the Conference on the Future of …, 2000 - dl.acm.org
Software Engineering for Safety: A Roadmap Robyn Lutz Page 1 Software Engineering for
Safety: A Roadmap Robyn Lutz Key Research Pointers Provide readier access to formal …

The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety”

L Piètre-Cambacédès, C Chaudet - International Journal of Critical …, 2010 - Elsevier
The meaning of the terms “security” and “safety” varies considerably from one context to
another, leading to potential ambiguities. These ambiguities are very problematic in the …