By Topic

A coordination model for improving software system attack-tolerance and survivability in open hostile environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Kwiaty, K. ; Inf. Directorate, Air Force Res. Lab., Rome, NY ; Shangping Ren

The paper presents a coordination model that contains three active entities: actors, roles and coordinators. Actors abstract the system's functionalities; while roles and coordinators statically encapsulate coordination constraints and dynamically propagate these constraints among themselves and onto the actors. Software system's attack-tolerance and survivability in open hostile environments are enhanced through appropriate constraint propagations and constraint enforcements. The role represents a group of actors which share the same set of behaviors declared by the role. Coordination and coordination constraints in the model are categorized into two classes: inter-role coordination and intra-role coordination. The coordinators are responsible for inter-role coordination; while the roles are not only abstractions for a set of behaviors, but also responsible for coordinating the actors which share the same role. This setting implies that both the coordination constraints and coordination activities are decentralized and distributed among the coordinators and the roles. The decentralization not only shields the system from single point of failures, but also provides a foundation and posts for survivable feedback loops to be built upon. The survivable feedback loops presented in the model further restrains the contamination of faulty elements and protects the whole system from being broken down by single failures

Published in:

Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006. IEEE International Conference on  (Volume:1 )

Date of Conference:

5-7 June 2006