Case study: Comparison of various approaches in Fault-Tolerant and Attack-Resistant system design
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F14%3A00219605" target="_blank" >RIV/68407700:21240/14:00219605 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Case study: Comparison of various approaches in Fault-Tolerant and Attack-Resistant system design
Popis výsledku v původním jazyce
Fault-tolerance and attack-resistance are often discussed properties of embedded systems but are ready archieved at the same time. The deployment of fault-tolerant systems demands some kind of reliability in hazard environment or the possibility of recovery in case of failure of the system to protect human lives or to prevent damage to property. The attack-resistant devices on the other hand protect the secrets/money or some other sensitive information of others from being misused or stolen. But as thenumber of attacks on software systems becomes more frequent and as the required education of attackers keeps decreasing, the question is - "When will the safety - critical systems become a target of malicious attacks?" The aim of this paper is to discussvarious fault tolerant and attack resistant systém design approaches, to find common properties and to compare them to the ordinary design flow of the embedded systems. The goal of this work is to discuss the possibility of having both f
Název v anglickém jazyce
Case study: Comparison of various approaches in Fault-Tolerant and Attack-Resistant system design
Popis výsledku anglicky
Fault-tolerance and attack-resistance are often discussed properties of embedded systems but are ready archieved at the same time. The deployment of fault-tolerant systems demands some kind of reliability in hazard environment or the possibility of recovery in case of failure of the system to protect human lives or to prevent damage to property. The attack-resistant devices on the other hand protect the secrets/money or some other sensitive information of others from being misused or stolen. But as thenumber of attacks on software systems becomes more frequent and as the required education of attackers keeps decreasing, the question is - "When will the safety - critical systems become a target of malicious attacks?" The aim of this paper is to discussvarious fault tolerant and attack resistant systém design approaches, to find common properties and to compare them to the ordinary design flow of the embedded systems. The goal of this work is to discuss the possibility of having both f
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
JC - Počítačový hardware a software
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2014
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Sborník příspěvků PAD 2014
ISBN
978-80-7494-026-2
ISSN
—
e-ISSN
—
Počet stran výsledku
6
Strana od-do
81-86
Název nakladatele
Technical University of Liberec
Místo vydání
Liberec
Místo konání akce
Malá Skála
Datum konání akce
4. 9. 2014
Typ akce podle státní příslušnosti
CST - Celostátní akce
Kód UT WoS článku
—