-
Article type: Cover
2008 Volume 30 Issue 3 Pages
Cover1-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
i-vii
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Index
2008 Volume 30 Issue 3 Pages
xiii-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Index
2008 Volume 30 Issue 3 Pages
xiv-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Tohru KIKUNO
Article type: Article
2008 Volume 30 Issue 3 Pages
205-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Masayuki HIRAYAMA
Article type: Article
2008 Volume 30 Issue 3 Pages
206-214
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Juichi TAKAHASHI, Seiji MUNETOH
Article type: Article
2008 Volume 30 Issue 3 Pages
215-222
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Toshikazu UEMURA, Tadashi DOHI
Article type: Article
2008 Volume 30 Issue 3 Pages
223-234
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
In traditional dependable software design technologies, it has been assumed implicitly that the software was used in disconnection form to computer networks and that their main purpose was to contain effects of system failures in the operational phase, caused by the remaining faults in the software. Then the fault tolerant design technology based on the principle of redundancy still plays a central role in realization of highly dependable systems. On the other hand, the use of computer networks has been undergoing dramatic growth in scale, variety and coverage, and has given rise to an increasing number of vulnerabilities and malicious threats. As the result, software systems connected to networks may be often exposed to the risk by malicious attacks, and many security failures may occur in practice. The classical security-related work to prevent security risk has privileged intrusion detection and intrusion tolerance. In this tutorial article, we focus on the intrusion tolerant technique, which is inspired from the traditional software fault tolerant technique, and introduce the quantitative evaluation methods of system security, based on stochastic modeling.
View full abstract
-
Koichi TAKAHASHI
Article type: Article
2008 Volume 30 Issue 3 Pages
235-242
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Takafumi MATSUO, Tatsuhiro TSUCHIYA, Tohru KIKUNO
Article type: Article
2008 Volume 30 Issue 3 Pages
243-251
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Akinori SAITOH
Article type: Article
2008 Volume 30 Issue 3 Pages
252-261
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Minoru KIKUCHI
Article type: Article
2008 Volume 30 Issue 3 Pages
262-267
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Daichi MIZUGUCHI
Article type: Article
2008 Volume 30 Issue 3 Pages
268-277
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Takeshi HASHIMOTO
Article type: Article
2008 Volume 30 Issue 3 Pages
278-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Sadanori ITO
Article type: Article
2008 Volume 30 Issue 3 Pages
279-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Toshinari MATSUOKA
Article type: Article
2008 Volume 30 Issue 3 Pages
280-285
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
286-288
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
288-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
289-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
291-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
292-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
292-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
292-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
App1-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
294-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Ryuichi SEKITA, Shu YAMADA
Article type: Article
2008 Volume 30 Issue 3 Pages
295-304
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
System safety has been being applied in Japan Aerospace Exploration Agency (JAXA)'s launch vehicle and satellite development projects but system safety has not been necessarily effective yet. JAXA is continuously working for system safety improvement. The clear answer for "What does system safety mean to me?" is necessary for the improvement. Many former researches show the necessity of system safety by qualitative analysis. This paper represents the fields that need system safety by the data analysis using the daily life accidents data from National Institute of Technology Evaluation (NITE). This paper also represents the function of system safety for the prevention of accidents.
View full abstract
-
Article type: Appendix
2008 Volume 30 Issue 3 Pages
305-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS
-
Article type: Cover
2008 Volume 30 Issue 3 Pages
Cover2-
Published: May 01, 2008
Released on J-STAGE: January 31, 2018
JOURNAL
FREE ACCESS