skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Risk assessment and integrity in system design

Abstract

All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system implementations. Furthermore, the authors would like the system design process to be able to leverage off of this understanding. It is important to deal with failures in a system context, rather than a priori limiting the solution to a particular technology, such as software alone. Their approach is limited to the class of systems that can be modeled by hybrid finite state machines (HFSMs) as described in Winter. The purpose of this paper is to lay out a process, or framework that can aid in identification and characterization of techniques for dealing with the different types of system threats. This framework leads naturally to a taxonomy of technologies and strategies for dealing with the various types of threats. In this process technologies are used to identify a priority list of technical capabilities for dealing with threats. The technologies are prioritized according to their analyzability and predictability. Strategies are then used to identify specific implementations that are best suited to dealing with the threat.

Authors:
;
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Org.:
USDOE, Washington, DC (United States)
OSTI Identifier:
672076
Report Number(s):
SAND-98-0707C; CONF-980809-
ON: DE98005717; BR: DP0102021; TRN: AHC2DT07%%235
DOE Contract Number:  
AC04-94AL85000
Resource Type:
Conference
Resource Relation:
Conference: International conference on engineering of complex computer systems, Monterey, CA (United States), 10-14 Aug 1998; Other Information: PBD: Mar 1998
Country of Publication:
United States
Language:
English
Subject:
42 ENGINEERING NOT INCLUDED IN OTHER CATEGORIES; SYSTEMS ANALYSIS; COMPUTER CODES; RISK ASSESSMENT; FAILURES; MITIGATION; CONTROL EQUIPMENT; RELIABILITY; SAFETY ENGINEERING

Citation Formats

Berg, R S, and Winter, V. Risk assessment and integrity in system design. United States: N. p., 1998. Web.
Berg, R S, & Winter, V. Risk assessment and integrity in system design. United States.
Berg, R S, and Winter, V. 1998. "Risk assessment and integrity in system design". United States. https://www.osti.gov/servlets/purl/672076.
@article{osti_672076,
title = {Risk assessment and integrity in system design},
author = {Berg, R S and Winter, V},
abstractNote = {All systems, regardless of how carefully they have been constructed, suffer failures. This paper focuses on developing a formal understanding of failure with respect to system implementations. Furthermore, the authors would like the system design process to be able to leverage off of this understanding. It is important to deal with failures in a system context, rather than a priori limiting the solution to a particular technology, such as software alone. Their approach is limited to the class of systems that can be modeled by hybrid finite state machines (HFSMs) as described in Winter. The purpose of this paper is to lay out a process, or framework that can aid in identification and characterization of techniques for dealing with the different types of system threats. This framework leads naturally to a taxonomy of technologies and strategies for dealing with the various types of threats. In this process technologies are used to identify a priority list of technical capabilities for dealing with threats. The technologies are prioritized according to their analyzability and predictability. Strategies are then used to identify specific implementations that are best suited to dealing with the threat.},
doi = {},
url = {https://www.osti.gov/biblio/672076}, journal = {},
number = ,
volume = ,
place = {United States},
year = {Sun Mar 01 00:00:00 EST 1998},
month = {Sun Mar 01 00:00:00 EST 1998}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: