The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2009 vol.11)
pp: 35-40
John Harauz , Jonic Systems Engineering
George F. Hurlburt , Change Index
ABSTRACT
Any complex autonomic or organic computing system should be trustworthy to avoid the risk of losing control of it and to retain confidence that it won't fail. Today's distributed systems include components that are strongly dependent on each other for their correct behavior. In a system that incorporates pervasive and mobile computing functionality, these dependencies include a huge variety of devices and their associated software. In such systems, change is a constant concern, so it's crucial that dynamic and intricate environments be managed. Dependable systems can't be built without a significant monitoring and management component. This article examines several approaches to establishing and monitoring system trustworthiness. In particular, it explores health monitoring, string kernels, available commercial tools, design considerations, and the semantic exploitation of environmental artifacts.
INDEX TERMS
IT professional, information systems, trustworthiness, software environments, system health monitoring
CITATION
John Harauz, Jeffrey Voas, George F. Hurlburt, "Trustworthiness in Software Environments", IT Professional, vol.11, no. 5, pp. 35-40, September/October 2009, doi:10.1109/MITP.2009.111
REFERENCES
1. D. Liben-Nowell et al., "Observations on the Dynamic Evolution of Peer-to-Peer Networks," Proc. 1st Int'l Workshop on Peer-to-Peer Systems (IPTPS '02), MIT Faculty Club, 2002, www.cs.rice.edu/Conferences/IPTPS02/187.pdf.
2. T. Roscoe et al, "InfoSpect: Using a Logic Language for System Health Monitoring in Distributed Systems," Planetlab, Dec. 2002; www.planet-lab.org/files/pdn/PDN-02-008/pdn-02-008.pdf.
3. R. Herbrich, Learning Kernel Classifiers, MIT Press, 2002.
4. J.S. Shapiro et al., "Operating System Support for Active Networks," tech. report MS-CIS-97-03, Univ. of Pennsylvania, Feb. 1997.
5. D. Reed et al., "Xenoservers: Accounted Execution of Untrusted Code," Proc. 7th Workshop Hot Topics in Operating Systems (HotOS-VII), IEEE Press, 1999, pp. 136–141.
6. R. Grimm et al., "A System Architecture for Pervasive Computing," Proc. 9th ACM SIGOPS European Workshop, ACM Press, 2000, pp. 177–182.
7. D.C. Price et al., "An Integrated Health Monitoring System for an Ageless Aerospace Vehicle," Structural Health Monitoring 2003: From Diagnostics &Prognostics to Structural Health Management, F.-K. Chang ed., DEStech Publications, 2003, pp. 310–318.
8. M. Newman, A. Barabasi, and D. Watts, "Function, and Evolvability of Software Collaboration Graphs," Physics Rev., vol. 68, no. 4, 2003, pp. 332–346.
9. G. Hurlburt, K. Miller, and J. Voas, "An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008," IT Professional, vol. 11, no. 1, 2009, pp. 14–19.
64 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool