With the publication and enforcement of the standard IEC 61508 of safety related systems, recent system architectures have been presented and evaluated. Among a number of techniques and measures to the evaluation of s...
With the publication and enforcement of the standard IEC 61508 of safety related systems, recent system architectures have been presented and evaluated. Among a number of techniques and measures to the evaluation of safety integrity level (SIL) for safety-related systems, several measures such as reliability block diagrams and Markov models are used to analyze the probability of failure on demand (PFD) and mean time to failure (MTTF) which conform to IEC 61508. The current paper deals with the quantitative analysis of the novel 1oo4-architecture (one out of four) presented in recent work. Therefore sophisticated calculations for the required parameters are introduced. The provided 1oo4-architecture represents an advanced safety architecture based on on-chip redundancy, which is 3-failure safe. This means that at least one of the four channels have to work correctly in order to trigger the safety function.
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the syste...
详细信息
ISBN:
(纸本)9781618040282
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the system is supposed to do and what can go wrong. This article presents the service-oriented approach - security services that can be developed and tested and applied against many types of applications or scenarios. The proposed concept has the contribution to allow for SSAS (Software Security as a Service) providers to provide access to software services without requiring the customer to host this service within their local environment. In this model, the access control decision and (ideally) enforcement functionality is not embedded within an application. The split of enforcement and decision point has its advantages.
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, and processed. The aim of this paper is to prop...
详细信息
ISBN:
(纸本)9789604742974
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, and processed. The aim of this paper is to propose an ontology dependent approach to transform XML based scientific data description into RDF instances in order to using them as a complete resource on the Semantic Web. The transforming process includes: establishing an ontology describing the data semantic and links between the elements of the output RDF file;establishing a mapping document defining the relationship between the input XML Schema file and the OWL ontology. The proposed approach has been verified successfully as web service implementation utilizing specific scientific experimental data.
Access control is a vital security mechanism in today's operating systems and the security policies dictating the security relevant behaviors is lengthy and complex for example in Security-Enhanced Linux (SELinux)...
详细信息
We introduce a new nameless representation of lambda terms inspired by ordered logic. At a lambda abstraction, number and relative position of all occurrences of the bound variable are stored, and application carries ...
详细信息
Maximum Distance Separable (MDS) codes are used as diffusion layers in the design of the well known block ciphers like the Advanced Encryption Standard (AES) and Khazad. The reason for the use of MDS codes in the desi...
详细信息
This particular essay expounds upon how one can foresee and predict software reliability. There are two major components that exist within a computer system: hardware and software. The reliabilities between the two ar...
详细信息
This particular essay expounds upon how one can foresee and predict software reliability. There are two major components that exist within a computer system: hardware and software. The reliabilities between the two are comparable because both are stochastic processes, which can be described by probability distributions. With this said, software reliability is the probability that will function without failure in a given software and in a given environment during a specified period of time. Thus, this is why software reliability is a major and key factor in software developmental processes and quality. However, one can spot the difference between software reliability and hardware reliability where it concerns the quality duration and the fact that software reliability does not decrease its reliability over time.
Data flow processing is a common task of embedded systems which is usually modeled as a pipeline. Errors in a block of this pipeline can be propagated through it thus leading to unexpected and erroneous behaviors. For...
详细信息
The goal of this paper is to analyze and propose a reconstruction of functional possibilities and database requirements of a Web based Educational Information system. For the research the Information system of the Tec...
详细信息
The goal of this paper is to analyze and propose a reconstruction of functional possibilities and database requirements of a Web based Educational Information system. For the research the Information system of the Technology School "electronic Systems" (TUES) associated with the Technical University of Sofia is on focus. The modules for admission of students, specialty classification, and graduation of students, management of the student's work in computer classrooms and lecturers' data management have been analyzed, developed and implemented. The additionally developed modules concern mainly the management of educational process and do not affect the e-learning or the official part modules. That led to the idea that the functionality for managing educational process has to be organized in a separate module defined as module for administrative services of educational process. Such restructuring of the system will bring flexibility in further growth of the system--for example students' admission or selection for different purposes.
New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.
New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.
暂无评论