Computer Safety, Reliability and Security [[electronic resource] ] : 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002. Proceedings / / edited by Stuart Anderson, Sandro Bologna, Massimo Felici |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (CCCLXXII, 352 p.) |
Disciplina | 005 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Software engineering
Optical data processing Data encryption (Computer science) Coding theory Information theory Special purpose computers Computer logic Software Engineering/Programming and Operating Systems Image Processing and Computer Vision Cryptology Coding and Information Theory Special Purpose and Application-Based Systems Logics and Meanings of Programs |
ISBN | 3-540-45732-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Human-Computer System Dependability (Joint ECCE-11 & SAFECOMP 2002) -- Human-Computer System Dependability -- Dependability of Joint Human-Computer Systems -- Keynote Talk -- Dependability in the Information Society: Getting Ready for the FP6 -- Human Factors -- A Rigorous View of Mode Confusion -- Dependability as Ordinary Action -- Security -- Practical Solutions to Key Recovery Based on PKI in IP Security -- Redundant Data Acquisition in a Distributed Security Compound -- Survivability Strategy for a Security Critical Process -- Dependability Assessment (Poster Session) -- Statistical Comparison of Two Sum-of-Disjoint-Product Algorithms for Reliability and Safety Evaluation -- Safety and Security Analysis of Object-Oriented Models -- The CORAS Framework for a Model-Based Risk Management Process -- Keynote Talk -- Software Challenges in Aviation Systems -- Application of Formal Methods (Poster Session) -- A Strategy for Improving the Efficiency of Procedure Verification -- Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time -- Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Components -- Reliability Assessment -- Assessment of the Benefit of Redundant Systems -- Estimating Residual Faults from Code Coverage -- Design for Dependability -- Towards a Metrics Based Verification and Validation Maturity Model -- Analysing the Safety of a Software Development Process -- Software Criticality Analysis of COTS/SOUP -- Safety Assessment -- Methods of Increasing Modelling Power for Safety Analysis, Applied to a Turbine Digital Control System -- Checking Safe Trajectories of Aircraft Using Hybrid Automata -- Model-Based On-Line Monitoring Using a State Sensitive Fault Propagation Model -- Keynote Talk -- On Diversity, and the Elusiveness of Independence -- Design for Dependability (Poster Session) -- An Approach to a New Network Security Architecture for Academic Environments -- A Watchdog Processor Architecture with Minimal Performance Overhead -- Application of Formal Methods -- Model-Checking Based on Fluid Petri Nets for the Temperature Control System of the ICARO Co-generative Plant -- Assertion Checking Environment (ACE) for Formal Verification of C Programs -- Safety Analysis of the Height Control System for the Elbtunnel -- Design for Dependability -- Dependability and Configurability: Partners or Competitors in Pervasive Computing? -- Architectural Considerations in the Certification of Modular Systems -- A Problem-Oriented Approach to Common Criteria Certification. |
Record Nr. | UNISA-996466220603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Safety, Reliability and Security : 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002. Proceedings / / edited by Stuart Anderson, Sandro Bologna, Massimo Felici |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (CCCLXXII, 352 p.) |
Disciplina | 005 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Software engineering
Optical data processing Data encryption (Computer science) Coding theory Information theory Special purpose computers Computer logic Software Engineering/Programming and Operating Systems Image Processing and Computer Vision Cryptology Coding and Information Theory Special Purpose and Application-Based Systems Logics and Meanings of Programs |
ISBN | 3-540-45732-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Human-Computer System Dependability (Joint ECCE-11 & SAFECOMP 2002) -- Human-Computer System Dependability -- Dependability of Joint Human-Computer Systems -- Keynote Talk -- Dependability in the Information Society: Getting Ready for the FP6 -- Human Factors -- A Rigorous View of Mode Confusion -- Dependability as Ordinary Action -- Security -- Practical Solutions to Key Recovery Based on PKI in IP Security -- Redundant Data Acquisition in a Distributed Security Compound -- Survivability Strategy for a Security Critical Process -- Dependability Assessment (Poster Session) -- Statistical Comparison of Two Sum-of-Disjoint-Product Algorithms for Reliability and Safety Evaluation -- Safety and Security Analysis of Object-Oriented Models -- The CORAS Framework for a Model-Based Risk Management Process -- Keynote Talk -- Software Challenges in Aviation Systems -- Application of Formal Methods (Poster Session) -- A Strategy for Improving the Efficiency of Procedure Verification -- Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time -- Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Components -- Reliability Assessment -- Assessment of the Benefit of Redundant Systems -- Estimating Residual Faults from Code Coverage -- Design for Dependability -- Towards a Metrics Based Verification and Validation Maturity Model -- Analysing the Safety of a Software Development Process -- Software Criticality Analysis of COTS/SOUP -- Safety Assessment -- Methods of Increasing Modelling Power for Safety Analysis, Applied to a Turbine Digital Control System -- Checking Safe Trajectories of Aircraft Using Hybrid Automata -- Model-Based On-Line Monitoring Using a State Sensitive Fault Propagation Model -- Keynote Talk -- On Diversity, and the Elusiveness of Independence -- Design for Dependability (Poster Session) -- An Approach to a New Network Security Architecture for Academic Environments -- A Watchdog Processor Architecture with Minimal Performance Overhead -- Application of Formal Methods -- Model-Checking Based on Fluid Petri Nets for the Temperature Control System of the ICARO Co-generative Plant -- Assertion Checking Environment (ACE) for Formal Verification of C Programs -- Safety Analysis of the Height Control System for the Elbtunnel -- Design for Dependability -- Dependability and Configurability: Partners or Competitors in Pervasive Computing? -- Architectural Considerations in the Certification of Modular Systems -- A Problem-Oriented Approach to Common Criteria Certification. |
Record Nr. | UNINA-9910143904903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Safety, Reliability, and Security [[electronic resource] ] : 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011, Proceedings / / edited by Francesco Flammini, Sandro Bologna, Valeria Vittorini |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XI, 482 p. 180 illus., 93 illus. in color.) |
Disciplina | 005.8 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer security
Computer communication systems Software engineering Algorithms Computers and civilization Special purpose computers Systems and Data Security Computer Communication Networks Software Engineering Algorithm Analysis and Problem Complexity Computers and Society Special Purpose and Application-Based Systems |
ISBN | 3-642-24270-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465931603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Critical Information Infrastructure Security [[electronic resource] ] : 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers / / edited by Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 227 p. 56 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computers and civilization Data encryption (Computer science) Systems and Data Security Computer Communication Networks Computers and Society Cryptology |
ISBN | 3-642-41476-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Ten National Cyber Security Strategies: A Comparison -- Analysis of Dependencies in Critical Infrastructures -- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures -- An Innovative Approach to Emergency Management in Large Infrastructures -- Dynamic Evacuation Guidance as Safety Critical Application in Building Automation -- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation -- Sub-optimal Topological Protection Strategy from Advanced Malware -- The Insider Threat in Cloud Computing -- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects -- How to Perform Verification and Validation of Critical Infrastructure Modeling Tools -- Petri Net Modelling of Physical Vulnerability -- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks Against a Simulated Power Plant -- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example -- The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure -- The Contribution of NEISAS to EP3R -- Policies to Improve Resilience against Major Industrial Accidents -- Fuzzy Input-Output Inoperability Model -- Dependencies Discovery and Analysis in Distributed Systems -- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation -- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis -- Countermeasures Selection via Evidence Theory -- The Robustness of Assortativity. |
Record Nr. | UNISA-996465484403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Critical Information Infrastructure Security : 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers / / edited by Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 227 p. 56 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computers and civilization Data encryption (Computer science) Systems and Data Security Computer Communication Networks Computers and Society Cryptology |
ISBN | 3-642-41476-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Ten National Cyber Security Strategies: A Comparison -- Analysis of Dependencies in Critical Infrastructures -- Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures -- An Innovative Approach to Emergency Management in Large Infrastructures -- Dynamic Evacuation Guidance as Safety Critical Application in Building Automation -- Defeating Node Based Attacks on SCADA Systems Using Probabilistic Packet Observation -- Sub-optimal Topological Protection Strategy from Advanced Malware -- The Insider Threat in Cloud Computing -- Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects -- How to Perform Verification and Validation of Critical Infrastructure Modeling Tools -- Petri Net Modelling of Physical Vulnerability -- Investigating the Effect of Network Parameters on Coordinated Cyber Attacks Against a Simulated Power Plant -- The Role of the DNS in the Secure and Resilient Operation of CIs, the Energy System Example -- The Development of Warning, Advice and Reporting Points (WARPs) in UK National Infrastructure -- The Contribution of NEISAS to EP3R -- Policies to Improve Resilience against Major Industrial Accidents -- Fuzzy Input-Output Inoperability Model -- Dependencies Discovery and Analysis in Distributed Systems -- Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation -- Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis -- Countermeasures Selection via Evidence Theory -- The Robustness of Assortativity. |
Record Nr. | UNINA-9910483166603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|