Rigorous Development of an Embedded Fault-Tolerant System Based on Coordinated Atomic Actions
IEEE Transactions on Computers - Special issue on fault-tolerant embedded systems
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
A Practical Approach to Secure Web Services
ISORC '06 Proceedings of the Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing
Dependability Assessment of Grid Middleware
DSN '07 Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
The N-Version Approach to Fault-Tolerant Software
IEEE Transactions on Software Engineering
FT-Grid: a system for achieving fault tolerance in grids
Concurrency and Computation: Practice & Experience - Selected Papers from the 2005 U.K. e-Science All Hands Meeting (AHM 2005)
A Fault Taxonomy for Web Service Composition
Service-Oriented Computing - ICSOC 2007 Workshops
Dynamic Authentication for Cross-Realm SOA-Based Business Processes
IEEE Transactions on Services Computing
A systematic review of design diversity-based solutions for fault-tolerant SOAs
Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering
Hi-index | 0.00 |
Service-orientation is a useful means of developing highly flexible and adaptive software systems, and it is a paradigm that has been increasingly adopted into Grids and Clouds. However, service-oriented architectures and designs also bring with them new challenges in the fields of dependability and security that need to be addressed carefully in order to provide sufficient support to enable service-oriented systems to offer non-trivial Quality of Service guarantees. In this paper we examine such challenges and introduce several advanced techniques developed at the University of Leeds to achieve dependability and security in service-oriented systems and applications. These techniques include schemes for achieving fault tolerance, privacy protection, and dynamic authentication, as well as a method for assessing dependability based on fault-injection. We describe and discuss each technique alongside the results of experimental evaluations of it.