LEADER 06698nam 22008535 450 001 996466220603316 005 20200704152443.0 010 $a3-540-45732-1 024 7 $a10.1007/3-540-45732-1 035 $a(CKB)1000000000211755 035 $a(SSID)ssj0000322114 035 $a(PQKBManifestationID)11937851 035 $a(PQKBTitleCode)TC0000322114 035 $a(PQKBWorkID)10280971 035 $a(PQKB)10215617 035 $a(DE-He213)978-3-540-45732-9 035 $a(MiAaPQ)EBC3072270 035 $a(PPN)155232215 035 $a(EXLCZ)991000000000211755 100 $a20121227d2002 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Safety, Reliability and Security$b[electronic resource] $e21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002. Proceedings /$fedited by Stuart Anderson, Sandro Bologna, Massimo Felici 205 $a1st ed. 2002. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2002. 215 $a1 online resource (CCCLXXII, 352 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2434 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-44157-3 320 $aIncludes bibliographical references and index. 327 $aHuman-Computer System Dependability (Joint ECCE-11 & SAFECOMP 2002) -- Human-Computer System Dependability -- Dependability of Joint Human-Computer Systems -- Keynote Talk -- Dependability in the Information Society: Getting Ready for the FP6 -- Human Factors -- A Rigorous View of Mode Confusion -- Dependability as Ordinary Action -- Security -- Practical Solutions to Key Recovery Based on PKI in IP Security -- Redundant Data Acquisition in a Distributed Security Compound -- Survivability Strategy for a Security Critical Process -- Dependability Assessment (Poster Session) -- Statistical Comparison of Two Sum-of-Disjoint-Product Algorithms for Reliability and Safety Evaluation -- Safety and Security Analysis of Object-Oriented Models -- The CORAS Framework for a Model-Based Risk Management Process -- Keynote Talk -- Software Challenges in Aviation Systems -- Application of Formal Methods (Poster Session) -- A Strategy for Improving the Efficiency of Procedure Verification -- Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time -- Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Components -- Reliability Assessment -- Assessment of the Benefit of Redundant Systems -- Estimating Residual Faults from Code Coverage -- Design for Dependability -- Towards a Metrics Based Verification and Validation Maturity Model -- Analysing the Safety of a Software Development Process -- Software Criticality Analysis of COTS/SOUP -- Safety Assessment -- Methods of Increasing Modelling Power for Safety Analysis, Applied to a Turbine Digital Control System -- Checking Safe Trajectories of Aircraft Using Hybrid Automata -- Model-Based On-Line Monitoring Using a State Sensitive Fault Propagation Model -- Keynote Talk -- On Diversity, and the Elusiveness of Independence -- Design for Dependability (Poster Session) -- An Approach to a New Network Security Architecture for Academic Environments -- A Watchdog Processor Architecture with Minimal Performance Overhead -- Application of Formal Methods -- Model-Checking Based on Fluid Petri Nets for the Temperature Control System of the ICARO Co-generative Plant -- Assertion Checking Environment (ACE) for Formal Verification of C Programs -- Safety Analysis of the Height Control System for the Elbtunnel -- Design for Dependability -- Dependability and Configurability: Partners or Competitors in Pervasive Computing? -- Architectural Considerations in the Certification of Modular Systems -- A Problem-Oriented Approach to Common Criteria Certification. 330 $aThis book constitutes the refereed proceedings of the 21st International Conference on Computer Safety, Reliability and Security, SAFECOMP 2002, held in Catania, Italy in September 2002. The 27 revised papers presented together with 3 keynote presentations were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections on human-computer system dependability, human factors, security, dependability assessment, application of formal methods, reliability assessment, design for dependability, and safety assessment. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2434 606 $aSoftware engineering 606 $aOptical data processing 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aSpecial purpose computers 606 $aComputer logic 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 615 0$aSoftware engineering. 615 0$aOptical data processing. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aSpecial purpose computers. 615 0$aComputer logic. 615 14$aSoftware Engineering/Programming and Operating Systems. 615 24$aImage Processing and Computer Vision. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aLogics and Meanings of Programs. 676 $a005 702 $aAnderson$b Stuart$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBologna$b Sandro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFelici$b Massimo$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSAFECOMP 2002 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466220603316 996 $aComputer Safety, Reliability, and Security$9772429 997 $aUNISA