All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system implementations. Furthermore, the authors would like the system design process to be able to leverage off of this understanding. It is important to deal with failures in a system context, rather than a priori limiting the solution to a particular technology, such as software alone. Their approach is limited to the class of systems that can be modeled by hybrid finite state machines (HFSMs) as described in Winter. The purpose of this paper is …
continued below
Publisher Info:
Sandia National Labs., Albuquerque, NM (United States)
Place of Publication:
Albuquerque, New Mexico
Provided By
UNT Libraries Government Documents Department
Serving as both a federal and a state depository library, the UNT Libraries Government Documents Department maintains millions of items in a variety of formats. The department is a member of the FDLP Content Partnerships Program and an Affiliated Archive of the National Archives.
Descriptive information to help identify this article.
Follow the links below to find similar items on the Digital Library.
Description
All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system implementations. Furthermore, the authors would like the system design process to be able to leverage off of this understanding. It is important to deal with failures in a system context, rather than a priori limiting the solution to a particular technology, such as software alone. Their approach is limited to the class of systems that can be modeled by hybrid finite state machines (HFSMs) as described in Winter. The purpose of this paper is to lay out a process, or framework that can aid in identification and characterization of techniques for dealing with the different types of system threats. This framework leads naturally to a taxonomy of technologies and strategies for dealing with the various types of threats. In this process technologies are used to identify a priority list of technical capabilities for dealing with threats. The technologies are prioritized according to their analyzability and predictability. Strategies are then used to identify specific implementations that are best suited to dealing with the threat.
This article is part of the following collection of related materials.
Office of Scientific & Technical Information Technical Reports
Reports, articles and other documents harvested from the Office of Scientific and Technical Information.
Office of Scientific and Technical Information (OSTI) is the Department of Energy (DOE) office that collects, preserves, and disseminates DOE-sponsored research and development (R&D) results that are the outcomes of R&D projects or other funded activities at DOE labs and facilities nationwide and grantees at universities and other institutions.
Berg, R.S. & Winter, V.Risk assessment and integrity in system design,
article,
March 1, 1998;
Albuquerque, New Mexico.
(https://digital.library.unt.edu/ark:/67531/metadc707717/:
accessed April 18, 2024),
University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu;
crediting UNT Libraries Government Documents Department.