Skip to main content

A Holistic Approach to Survivable Distributed Information System for Critical Applications

  • Conference paper
Parallel and Distributed Processing and Applications (ISPA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3758))

Abstract

In this paper, a holistic approach to realize survivability of distributed information network systems for critical applications(DISCA) based on three basic states, processed, stored, and transmitted, of information (called a PST-based system model), is proposed and its evaluation method and some experiment results are given as an example of its application. A PST-based system model brings all three parts together and coordinates them through the services supported by them, in which whole system’s survivability is embodied by system services and their interdependency relations. With this model, a multi-layer survivability framework based on the information states is formed and the complexity of a DISCA system in implementation and evaluation can be conquered in the most prevalent approach—“divide and conquer” approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McCumber, J.: Information Systems Security: A Comprehensive Model. In: Proceedings 14th National Computer Security Conference, pp. 328–337. National Institute of Standards and Technology, Baltimore (1991)

    Google Scholar 

  2. Victor, M., Schou, C., Ragsdale, D., et al.: A Model for Information Assurance: An Integrated Approach. In: Proc. of the 2001 IEEE Workshop on Information Assurance and Security, pp. 306–310. U.S. Military Academy, West Point (2001)

    Google Scholar 

  3. Yurcik, W., Doss, D.: A Survivability-Over-Security (SOS) Approach to Holistic Cyber-Ecosystem Assurance. In: Proc. of the 2002 IEEE Workshop on Information Assurance. United States Military Academy, West Point (2002)

    Google Scholar 

  4. Kartalopoulos, S.V.: Surviving a Disaster. IEEE Comm. Mag. 6, 124–126 (2002)

    Article  Google Scholar 

  5. Voas, J., McGraw, G., Ghosh, A.: Reducing uncertainty about survivability. In: Proceedings of the 1997 Information Survivability Workshop (1997)

    Google Scholar 

  6. Wang, H.Q.: An Approach to Designing and Implementing Function Back-up, Reconfiguration and Recovery for Distributed Fir Control System on Warship. Fire Control & Command Control 21(2), 64–68 (1996) (in Chinese)

    Google Scholar 

  7. Wang, H.Q.: Research on a Full Distributed Redundant Disk System. In: Proc. of 1997 IEEE ICIPS, Beijing (1997)

    Google Scholar 

  8. Wang, H.Q.: A Parallel and Fault-tolerant LAN with Dual Communication Subnetworks. In: Proc. of pAs 1997, Fukushima/JAPAN, IEEE Comp. Soc. Press (1997)

    Google Scholar 

  9. Wang, H.Q.: Distributed Redundant Disks: A new Approach to Reliably Sharing Network-based Storage System. System Eng’r and Electronics 19(4), 58–61 (1997) (in Chinese)

    Google Scholar 

  10. Wylie, J., Bigrigg, M., Strunk, J., et al.: Survivable Information Storage Systems. IEEE Computer 33(8), 61–68 (2000)

    Google Scholar 

  11. Millen June, J.K.: Survivability Measure (2000), http://www.csl.sri.com/users/millen/papers/measure.ps

  12. Keromytis, A.D., Parekh, J., Gross, P.N., et al.: A Holistic Approach to Service Survivability. In: Proc. of the ACM Survivable and Self-Regenerative Systems Workshop, pp. 11–22 (2003)

    Google Scholar 

  13. Medhi, D., Tipper, D.: Multi-Layered Network Survivability – Models, Analysis, Architecture, Framework and Implementation–An Overview. In: Proc. of DISCEX 2000. IEEE Computer Society Press, Hilton Head (2000)

    Google Scholar 

  14. Bowen, T., Chee, D., Segal, M., et al.: Building Survivable Systems: An Integrated Approach Based on Intrusion Detection and Damage Containment. In: Proc. of DISCEX 2000, Hilton Head Island, South Carolina, vol. 2, pp. 84–99 (2000)

    Google Scholar 

  15. Ellison, E., Linger, L., Longstaff, M.: Survivable Network Systems: An Emerging Discipline. Technical Report CMU/SEI-97-TR-013, Carnegie Mellon University, Pittsburgh (1997)

    Google Scholar 

  16. Fisher, D.: Emergent Algorithms: A New Method for Enhancing Survivability in Unbounded Systems. In: IEEE Proceedings of the Hawaii International Conference on Systems Sciences. IEEE Computer Society Press, New York (1999)

    Google Scholar 

  17. Knight, J., Lubinsky, R., McHugh, J., et al.: Architectural Approaches to Information Survivability. Technical Report: CS-97-25, University of Virginia,Charlottesville (1997)

    Google Scholar 

  18. Knight, J., et al.: Topics in Survivable Systems. Computer Science Report. No. CS-98-22, University of Virginia (1998)

    Google Scholar 

  19. Neumann, P.: Practical Architectures for Survivable Systems and Networks (Phase-Two Final Report). Computer Science Laboratory, SRI International (2000)

    Google Scholar 

  20. Knight, J.C., Sullivan, K.J., Elder, M.C., et al.: Survivability Architectures: Issues and Approaches. In: DISCEX 2000, Hilton Head, South Carolina, vol. 2, pp. 1157–1171 (2000)

    Google Scholar 

  21. Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing. IBM Systems Journal 42(1), 5–18 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H.Q., Liu, D.X., Xu, D., Lan, Y.Y., Li, X.Y., Zhao, Q. (2005). A Holistic Approach to Survivable Distributed Information System for Critical Applications. In: Pan, Y., Chen, D., Guo, M., Cao, J., Dongarra, J. (eds) Parallel and Distributed Processing and Applications. ISPA 2005. Lecture Notes in Computer Science, vol 3758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576235_72

Download citation

  • DOI: https://doi.org/10.1007/11576235_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29769-7

  • Online ISBN: 978-3-540-32100-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics