All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Case study: Comparison of various approaches in Fault-Tolerant and Attack-Resistant system design

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F14%3A00219605" target="_blank" >RIV/68407700:21240/14:00219605 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Case study: Comparison of various approaches in Fault-Tolerant and Attack-Resistant system design

  • Original language description

    Fault-tolerance and attack-resistance are often discussed properties of embedded systems but are ready archieved at the same time. The deployment of fault-tolerant systems demands some kind of reliability in hazard environment or the possibility of recovery in case of failure of the system to protect human lives or to prevent damage to property. The attack-resistant devices on the other hand protect the secrets/money or some other sensitive information of others from being misused or stolen. But as thenumber of attacks on software systems becomes more frequent and as the required education of attackers keeps decreasing, the question is - "When will the safety - critical systems become a target of malicious attacks?" The aim of this paper is to discussvarious fault tolerant and attack resistant systém design approaches, to find common properties and to compare them to the ordinary design flow of the embedded systems. The goal of this work is to discuss the possibility of having both f

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    JC - Computer hardware and software

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Sborník příspěvků PAD 2014

  • ISBN

    978-80-7494-026-2

  • ISSN

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

    81-86

  • Publisher name

    Technical University of Liberec

  • Place of publication

    Liberec

  • Event location

    Malá Skála

  • Event date

    Sep 4, 2014

  • Type of event by nationality

    CST - Celostátní akce

  • UT code for WoS article