Computer Safety, Reliability, and Security 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings /

Welcome to SAFECOMP 2006, the 25th International Conference on Computer Safety, Security and Reliability, held in Gdansk,Poland. Since it was established in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP h...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Górski, Janusz (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4166
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06372nam a22005535i 4500
001 978-3-540-45763-3
003 DE-He213
005 20151116135807.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 |a 9783540457633  |9 978-3-540-45763-3 
024 7 |a 10.1007/11875567  |2 doi 
040 |d GrThAP 
050 4 |a QA76.758 
072 7 |a UMZ  |2 bicssc 
072 7 |a UL  |2 bicssc 
072 7 |a COM051230  |2 bisacsh 
082 0 4 |a 005.1  |2 23 
245 1 0 |a Computer Safety, Reliability, and Security  |h [electronic resource] :  |b 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings /  |c edited by Janusz Górski. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2006. 
300 |a XIV, 442 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 4166 
505 0 |a Systems of Systems -- System of Systems Hazard Analysis Using Simulation and Machine Learning -- Through the Description of Attacks: A Multidimensional View -- On Certain Behavior of Scale-Free Networks Under Malicious Attacks -- Security and Survivability Analysis -- Verifying a Chipcard-Based Biometric Identification Protocol in VSE -- Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry -- Computer System Survivability Modelling by Using Stochastic Activity Network -- Nuclear Safety and Application of Standards -- Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant -- Regulatory Software Configuration Management System Design -- Gaining Confidence in the Software Development Process Using Expert Systems -- Formal Approaches -- Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems -- Stepwise Development of Secure Systems -- Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfiguration -- Networks Dependability -- New VoIP Traffic Security Scheme with Digital Watermarking -- Towards Filtering and Alerting Rule Rewriting on Single-Component Policies -- Using Group Overlapping to Protect Server from Attack in Grid Computing -- Coping with Change and Mobility -- The Role of Situation Awareness in Assuring Safety of Autonomous Vehicles -- Demonstration of Safety in Healthcare Organisations -- Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks -- Safety Analysis and Assessment -- Assessment of Hazard Identification Methods for the Automotive Domain -- A Tool for Databus Safety Analysis Using Fault Injection -- Towards a Unified Model-Based Safety Assessment -- Poster Session -- Reliability Analysis of Resilient Packet Rings -- Experiences with the Design of a Run-Time Check -- Development of an Integrated, Risk-Based Platform for Information and E-Services Security -- Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems -- Verification of Automatic Train Protection Systems with RTCP-Nets -- 6th FP Integrated Project DECOS -- Checking SCADE Models for Correct Usage of Physical Units -- Validation and Certification of Safety-Critical Embedded Systems – The DECOS Test Bench -- Encapsulating Application Subsystems Using the DECOS Core OS -- Modelling -- Modeling the Railway Control Domain Rigorously with a UML 2.0 Profile -- Access Control Coherence of Information Systems Based on Security Constraints -- Automatic Test Data Generation by Multi-objective Optimisation. 
520 |a Welcome to SAFECOMP 2006, the 25th International Conference on Computer Safety, Security and Reliability, held in Gdansk,Poland. Since it was established in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP has continuously contributed to the progress in high integrity applications of information technologies. The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability of critical IT systems and applications and serves as a platform for knowledge and technology transfer for researchers, industry (suppliers, operators, users), regulators and certi?ers of such systems. SAFECOMP provides ample opportunity to exchange insights and experiences on emerging methods, approaches and practical so- tions to safety, security and reliability problems across the borders of di?erent application domains and technologies. The SAFECOMP 2006 program re?ected in this book included 32 papers selected from 101 submissions of full texts. The submissions came from authors representing 26 di?erent countries from Europe, Asia, and North and South America. The 32 accepted papers were prepared by experts representing 14 d- ferent countries. The above data con?rm the broad and increasing interest in SAFECOMP and the topics addressed. The program was supplemented by three keynote presentations by outsta- ing invited experts (not included in this book). The keynotes focused on - terdisciplinary aspects of dependability of computer systems, practical aspects of application of safety standards and new challenges of information security research and development. 
650 0 |a Computer science. 
650 0 |a Special purpose computers. 
650 0 |a Software engineering. 
650 0 |a Coding theory. 
650 0 |a Computer logic. 
650 0 |a Management information systems. 
650 1 4 |a Computer Science. 
650 2 4 |a Software Engineering/Programming and Operating Systems. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Special Purpose and Application-Based Systems. 
650 2 4 |a Logics and Meanings of Programs. 
650 2 4 |a Management of Computing and Information Systems. 
700 1 |a Górski, Janusz.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540457626 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 4166 
856 4 0 |u http://dx.doi.org/10.1007/11875567  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)