06698nam 22008535 450 99646622060331620200704152443.03-540-45732-110.1007/3-540-45732-1(CKB)1000000000211755(SSID)ssj0000322114(PQKBManifestationID)11937851(PQKBTitleCode)TC0000322114(PQKBWorkID)10280971(PQKB)10215617(DE-He213)978-3-540-45732-9(MiAaPQ)EBC3072270(PPN)155232215(EXLCZ)99100000000021175520121227d2002 u| 0engurnn|008mamaatxtccrComputer Safety, Reliability and Security[electronic resource] 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002. Proceedings /edited by Stuart Anderson, Sandro Bologna, Massimo Felici1st ed. 2002.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2002.1 online resource (CCCLXXII, 352 p.) Lecture Notes in Computer Science,0302-9743 ;2434Bibliographic Level Mode of Issuance: Monograph3-540-44157-3 Includes bibliographical references and index.Human-Computer System Dependability (Joint ECCE-11 & SAFECOMP 2002) -- Human-Computer System Dependability -- Dependability of Joint Human-Computer Systems -- Keynote Talk -- Dependability in the Information Society: Getting Ready for the FP6 -- Human Factors -- A Rigorous View of Mode Confusion -- Dependability as Ordinary Action -- Security -- Practical Solutions to Key Recovery Based on PKI in IP Security -- Redundant Data Acquisition in a Distributed Security Compound -- Survivability Strategy for a Security Critical Process -- Dependability Assessment (Poster Session) -- Statistical Comparison of Two Sum-of-Disjoint-Product Algorithms for Reliability and Safety Evaluation -- Safety and Security Analysis of Object-Oriented Models -- The CORAS Framework for a Model-Based Risk Management Process -- Keynote Talk -- Software Challenges in Aviation Systems -- Application of Formal Methods (Poster Session) -- A Strategy for Improving the Efficiency of Procedure Verification -- Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time -- Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Components -- Reliability Assessment -- Assessment of the Benefit of Redundant Systems -- Estimating Residual Faults from Code Coverage -- Design for Dependability -- Towards a Metrics Based Verification and Validation Maturity Model -- Analysing the Safety of a Software Development Process -- Software Criticality Analysis of COTS/SOUP -- Safety Assessment -- Methods of Increasing Modelling Power for Safety Analysis, Applied to a Turbine Digital Control System -- Checking Safe Trajectories of Aircraft Using Hybrid Automata -- Model-Based On-Line Monitoring Using a State Sensitive Fault Propagation Model -- Keynote Talk -- On Diversity, and the Elusiveness of Independence -- Design for Dependability (Poster Session) -- An Approach to a New Network Security Architecture for Academic Environments -- A Watchdog Processor Architecture with Minimal Performance Overhead -- Application of Formal Methods -- Model-Checking Based on Fluid Petri Nets for the Temperature Control System of the ICARO Co-generative Plant -- Assertion Checking Environment (ACE) for Formal Verification of C Programs -- Safety Analysis of the Height Control System for the Elbtunnel -- Design for Dependability -- Dependability and Configurability: Partners or Competitors in Pervasive Computing? -- Architectural Considerations in the Certification of Modular Systems -- A Problem-Oriented Approach to Common Criteria Certification.This book constitutes the refereed proceedings of the 21st International Conference on Computer Safety, Reliability and Security, SAFECOMP 2002, held in Catania, Italy in September 2002. The 27 revised papers presented together with 3 keynote presentations were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections on human-computer system dependability, human factors, security, dependability assessment, application of formal methods, reliability assessment, design for dependability, and safety assessment.Lecture Notes in Computer Science,0302-9743 ;2434Software engineeringOptical data processingData encryption (Computer science)Coding theoryInformation theorySpecial purpose computersComputer logicSoftware Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Image Processing and Computer Visionhttps://scigraph.springernature.com/ontologies/product-market-codes/I22021Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Special Purpose and Application-Based Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I13030Logics and Meanings of Programshttps://scigraph.springernature.com/ontologies/product-market-codes/I1603XSoftware engineering.Optical data processing.Data encryption (Computer science).Coding theory.Information theory.Special purpose computers.Computer logic.Software Engineering/Programming and Operating Systems.Image Processing and Computer Vision.Cryptology.Coding and Information Theory.Special Purpose and Application-Based Systems.Logics and Meanings of Programs.005Anderson Stuartedthttp://id.loc.gov/vocabulary/relators/edtBologna Sandroedthttp://id.loc.gov/vocabulary/relators/edtFelici Massimoedthttp://id.loc.gov/vocabulary/relators/edtSAFECOMP 2002MiAaPQMiAaPQMiAaPQBOOK996466220603316Computer Safety, Reliability, and Security772429UNISA