|
|
|
|
LEADER |
07778nam a22005655i 4500 |
001 |
978-3-540-75101-4 |
003 |
DE-He213 |
005 |
20151116135429.0 |
007 |
cr nn 008mamaa |
008 |
100301s2007 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540751014
|9 978-3-540-75101-4
|
024 |
7 |
|
|a 10.1007/978-3-540-75101-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.758
|
072 |
|
7 |
|a UMZ
|2 bicssc
|
072 |
|
7 |
|a UL
|2 bicssc
|
072 |
|
7 |
|a COM051230
|2 bisacsh
|
082 |
0 |
4 |
|a 005.1
|2 23
|
245 |
1 |
0 |
|a Computer Safety, Reliability, and Security
|h [electronic resource] :
|b 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings /
|c edited by Francesca Saglietti, Norbert Oster.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2007.
|
300 |
|
|
|a XV, 548 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 4680
|
505 |
0 |
|
|a Safety Cases -- Establishing Evidence for Safety Cases in Automotive Systems – A Case Study -- Goal-Based Safety Cases for Medical Devices: Opportunities and Challenges -- Impact of Security on Safety -- Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety -- Future Perspectives: The Car and Its IP-Address – A Potential Safety and Security Risk Assessment -- Modelling Interdependencies Between the Electricity and Information Infrastructures -- Poster Session 1 -- Handling Malicious Code on Control Systems -- Management of Groups and Group Keys in Multi-level Security Environments -- Application of the XTT Rule-Based Model for Formal Design and Verification of Internet Security Systems -- RAMSS Analysis for a Co-operative Integrated Traffic Management System -- Combining Static/Dynamic Fault Trees and Event Trees Using Bayesian Networks -- Component Fault Tree Analysis Resolves Complexity: Dependability Confirmation for a Railway Brake System -- Compositional Temporal Fault Tree Analysis -- Representing Parameterised Fault Trees Using Bayesian Networks -- Human Error Analysis Based on a Semantically Defined Cognitive Pilot Model -- Safety Analysis of Safety-Critical Software for Nuclear Digital Protection System -- Specification of a Software Common Cause Analysis Method -- Combining Bayesian Belief Networks and the Goal Structuring Notation to Support Architectural Reasoning About Safety -- Application of Interactive Cause and Effect Diagrams to Safety-Related PES in Industrial Automation -- Survival by Deception -- How to Secure Bluetooth-Based Pico Networks -- Learning from Your Elders: A Shortcut to Information Security Management Success -- Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees -- Poster Session 2 -- Safety Process Improvement with POSE and Alloy -- Defense-in-Depth and Diverse Qualification of Safety-Critical Software -- Experimental Evaluation of the DECOS Fault-Tolerant Communication Layer -- Achieving Highly Reliable Embedded Software: An Empirical Evaluation of Different Approaches -- Modeling, Analysis and Testing of Safety Issues - An Event-Based Approach and Case Study -- A Concept for a Safe Realization of a State Machine in Embedded Automotive Applications -- Safety Demonstration and Software Development -- Improving Test Coverage for UML State Machines Using Transition Instrumentation -- Verification of Distributed Applications -- Analysis of Combinations of CRC in Industrial Communication -- A Comparison of Partitioning Operating Systems for Integrated Systems -- Software Encoded Processing: Building Dependable Systems with Commodity Hardware -- Reliability Modeling for the Advanced Electric Power Grid -- Case Study on Bayesian Reliability Estimation of Software Design of Motor Protection Relay -- A Reliability Evaluation of a Group Membership Protocol -- Poster Session 3 -- Bounds on the Reliability of Fault-Tolerant Software Built by Forcing Diversity -- A Tool for Network Reliability Analysis -- DFT and DRBD in Computing Systems Dependability Analysis -- Development of Model Based Tools to Support the Design of Railway Control Applications -- Formal Specification and Analysis of AFDX Redundancy Management Algorithms -- Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended Safecharts -- Using Deductive Cause-Consequence Analysis (DCCA) with SCADE -- Experimental Assessment of Astrée on Safety-Critical Avionics Software -- Detection of Runtime Errors in MISRA C Programs: A Deductive Approach -- A Taxonomy for Modelling Safety Related Architectures in Compliance with Functional Safety Requirements -- Controller Architecture for Safe Cognitive Technical Systems -- Improved Availability and Reliability Using Re-configuration Algorithm for Task or Process in a Flight Critical Software.
|
520 |
|
|
|a Since 1979, when it was ?rst established by the Technical Committee on Re- ability, Safety and Security of the European Workshop on Industrial Computer Systems (EWICS TC7), the SAFECOMP Conference series has regularly and continuously contributed to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied to safety-relevant industrial domains. Inthisexpandingtechnical?eldSAFECOMPo?ersaplatformforknowledge andtechnologytransferbetweenacademia,industry,researchandlicensingins- tutions, providing ample opportunities for exchanging insights, experiences and trends in the areas of safety, reliability and security regarding critical computer applications. In accordance with the growing spread of critical infrastructures involving both safety and security threats, this year’s SAFECOMP program included a considerable number of contributions addressing technical problems and engineering solutions across the border between safety-related and securi- related concerns. Thereactiontoourcallforpaperswasparticularlygratifyingandimpressive, including 136 full papers submitted by authors representing 29 countries from Europe,Asia, North and South America aswell asAustralia. The selection of 33 fullpapersand16shortpapersforpresentationandpublicationwasachallenging task requiring a huge amount of reviewing and organizational e?ort. In view of the particularly high number of articles submitted, obvious practical constraints led – to our regret – to the rejection of a considerable amount of high-quality work. To all authors, invited speakers, members of the International Program Committee and external reviewers go our heartfelt thanks! The local organization of SAFECOMP 2007, hosted in Nuremberg, is also gratefully acknowledged.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Computer logic.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|
650 |
2 |
4 |
|a Logics and Meanings of Programs.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
700 |
1 |
|
|a Saglietti, Francesca.
|e editor.
|
700 |
1 |
|
|a Oster, Norbert.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540751007
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 4680
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-540-75101-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|