LEADER 02842oam 2200613I 450 001 9910459459803321 005 20200520144314.0 010 $a0-429-07004-7 010 $a1-4398-0332-3 024 7 $a10.1201/b10094 035 $a(CKB)2670000000060526 035 $a(EBL)624966 035 $a(OCoLC)692197097 035 $a(SSID)ssj0000415711 035 $a(PQKBManifestationID)11296690 035 $a(PQKBTitleCode)TC0000415711 035 $a(PQKBWorkID)10411997 035 $a(PQKB)10964462 035 $a(MiAaPQ)EBC624966 035 $a(Au-PeEL)EBL624966 035 $a(CaPaEBR)ebr10433621 035 $a(CaONFJC)MIL693194 035 $a(EXLCZ)992670000000060526 100 $a20180331d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDesign and safety assessment of critical systems /$fMarco Bozzano, Adolfo Villafiorita 210 1$aBoca Raton :$cAuerbach Publications,$d2011. 215 $a1 online resource (288 p.) 300 $aDescription based upon print version of record. 311 $a1-4665-3235-1 311 $a1-322-61912-3 311 $a1-4398-0331-5 320 $aIncludes bibliographical references and index. 327 $aFront cover; Contents; Preface; Acknowledgments; About the Authors; Chapter 1: Introduction; Chapter 2: Dependability, Reliability,and Safety Assessment; Chapter 3: Techniques for Safety Assessment; Chapter 4: Development ofSafety-Critical Applications; Chapter 5: Formal Methods for Safety Assessment; Chapter 6: Formal Methods for Certification; Appendix A: The NuSMV Model Checker; Appendix B: The FSAP Safety Analysis Platform; Appendix C: Some Regulatory Bodies and Regulations; Back cover 330 $aSafety-critical systems, by definition those systems whose failure can cause catastrophic results for people, the environment, and the economy, are becoming increasingly complex both in their functionality and their interactions with the environment. Unfortunately, safety assessments are still largely done manually, a time-consuming and error-prone process. The growing complexity of these systems requires an increase in the skill and efficacy of safety engineers and encourages the adoption of formal and standardized techniques.An introduction to the area of design and verifica 606 $aIndustrial safety 606 $aSystem safety 608 $aElectronic books. 615 0$aIndustrial safety. 615 0$aSystem safety. 676 $a620.8/6 700 $aBozzano$b Marco.$0979809 701 $aVillafiorita$b Adolfo$0979810 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910459459803321 996 $aDesign and safety assessment of critical systems$92234592 997 $aUNINA LEADER 03213nam 22007215 450 001 9910483457003321 005 20251226195718.0 010 $a3-319-09770-9 024 7 $a10.1007/978-3-319-09770-1 035 $a(CKB)3710000000227362 035 $a(SSID)ssj0001338882 035 $a(PQKBManifestationID)11994256 035 $a(PQKBTitleCode)TC0001338882 035 $a(PQKBWorkID)11366189 035 $a(PQKB)10324655 035 $a(DE-He213)978-3-319-09770-1 035 $a(MiAaPQ)EBC6307280 035 $a(MiAaPQ)EBC5591373 035 $a(Au-PeEL)EBL5591373 035 $a(OCoLC)889872633 035 $a(PPN)180625942 035 $a(EXLCZ)993710000000227362 100 $a20140819d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust, Privacy, and Security in Digital Business $e11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings /$fedited by Claudia Eckert, Sokratis K. Katsikas, Günther Pernul 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XIV, 191 p. 44 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8647 300 $aIncludes index. 311 08$a3-319-09769-5 327 $aTrust management -- Trust metrics and evaluation models -- Privacy and trust in cloud computing -- Security management.- Security, trust, and privacy in mobile and pervasive environments. 330 $aThis book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8647 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aIT Operations 606 $aCryptology 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aData and Information Security. 615 24$aIT Operations. 615 24$aCryptology. 676 $a658.478 702 $aEckert$b Claudia$f1965-.$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKatsikas$b Sokratis K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPernul$b Günther$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483457003321 996 $aTrust, Privacy and Security in Digital Business$9772437 997 $aUNINA