Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Architecting dependable systems VI (LNCS 5835)
de Lemos R., Fabre J., Gacek C., Gadducci F., ter Beek M. Springer-Verlag, New York, NY,2009.Type:Divisible Book
Date Reviewed: Feb 17 2011

A system is defined to be dependable if reliance can be justifiably placed on the service it delivers. It is a definition adopted a few decades ago, originating from the work of the IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance. It has been widely recognized since then, and used in most major works. The concept of dependability involves several attributes, which make the practical use of dependability easier. They primarily include reliability, safety, and security.

This book is a collection of papers selected from two annual workshops organized in 2008: the Workshop on Architecting Dependable Systems (WADS) and the Workshop on Views on Designing Complex Architectures (VODCA). The papers are organized in three parts, covering service-oriented architectures (SOA), fault tolerance and assessment, and security-related issues.

The part on SOA gives a few hints on how to proceed to ensure dependability for a large system, where the number of variables and their mutual relationships is too big to successfully tackle the problems theoretically. The authors of the various papers make suggestions to use architectural patterns, architectural adaptation to environmental changes, controlled relinquishing of design constraints, and benchmarking.

While SOA is a relatively new area of research, which essentially came to existence with the advent of the Web, fault tolerance can be considered as old as computing itself. The new aspect of fault tolerance considered in this section of papers is addressing dependability attributes of networked systems from the architectural standpoint. Specific topics discussed in this volume include: self-repair without global shutdown, using redundancy to ensure fault tolerance, applying security analysis to verify and improve fault tolerance, and new techniques to deal with architectural complexity.

The third part addresses security issues at the architectural level. This is probably the most compelling task, since one has to deal with multiple layers of security in every computer system. Several theoretical tools are discussed--process algebras, the Paradigm language, subjective logic (SL), and communicating sequential processes (CSP)--with some level of experimentation to make the results more meaningful.

Overall, books that are collections of papers are hard to review, unless the papers are subject overviews discussing the state of the art in a certain discipline, which is not the case with this book. Nevertheless, reading this book has helped me refresh my knowledge of several theoretical concepts related to dependability and find their new applications. I am looking forward to seeing the publication of the next volume in this series.

Reviewer:  Janusz Zalewski Review #: CR138811 (1110-1010)
Bookmark and Share
  Featured Reviewer  
 
Service-oriented architecture (SOA) (D.2.11 ... )
 
 
Fault-Tolerance (D.4.5 ... )
 
 
Software Architectures (D.2.11 )
 
Would you recommend this review?
yes
no
Other reviews under "Service-oriented architecture (SOA)": Date
SOA and EA--sustainable contributions for increasing corporate agility
Schelp J., Aier S.  HICSS 2009 (Proceedings of the 42nd Hawaii International Conference on System Sciences, Waikoloa, HI, Jan 5-8, 2009)1-8, 2009. Type: Proceedings, Reviews: (1 of 2)
Aug 10 2010
SOA and EA--sustainable contributions for increasing corporate agility
Schelp J., Aier S.  HICSS 2009 (Proceedings of the 42nd Hawaii International Conference on System Sciences, Waikoloa, HI, Jan 5-8, 2009)1-8, 2009. Type: Proceedings, Reviews: (2 of 2)
Aug 23 2010
SOA with .NET and Windows Azure
Erl T., Prentice Hall PTR, Upper Saddle River, NJ, 2010.  600, Type: Book (978-0-131582-31-6)
Nov 11 2011
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy