Reading list for class on August 28, 2018
There are no required reading material for this class. We will however maintain a list of recommended readings for each lecture (whenever applicable) to further help you understand and explore the concepts. The terminology we use for these readings is as follows:
- Recommended reading: Reading material that is directly relevant to the class notes and can help you understand and remember things from class.
- Secondary reading: Reading material that is relevant to the class notes but goes beyond what was explained in the lectures, provides more examples, and explores different but related topics.
Recommended reading
- Avizienis, A., Laprie, J. C., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of
dependable and secure computing. IEEE transactions on dependable and secure computing, 1(1),
11-33.
- Sections 1, 2, 4, & 5
- Chapter 1 of [Trivedi and Bobbio,
2017]
- Available through the university library webpage.
Secondary reading
-
Nicol, D. M., Sanders, W. H., & Trivedi, K. S. (2004). Model-based evaluation: from dependability to security. IEEE Transactions on dependable and secure computing, 1(1), 48-65.
-
Trivedi, K. S., Kim, D. S., Roy, A., & Medhi, D. (2009, October). Dependability and security models. In Design of Reliable Communication Networks, 2009. DRCN 2009. 7th International Workshop on (pp. 11-20). IEEE.