Computer safety, reliability, and security : 27th international conference, Safecomp 2008 Newcastle upon Tyne, UK, September 22-25, 2008 proceedings / / Michael D. Harrison, Mark-Alexander Sujan (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (XIV, 456 p.) |
Disciplina | 005.1 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer software - Reliability
Computer security |
ISBN | 3-540-87698-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Papers -- Critical Information Infrastructures: Should Models Represent Structures or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk -- Panel: Complexity and Resilience -- Software Dependability -- The Effectiveness of T-Way Test Data Generation -- Towards Agile Engineering of High-Integrity Systems -- SafeSpection – A Systematic Customization Approach for Software Hazard Identification -- Integrating Safety Analyses and Component-Based Design -- Modelling Support for Design of Safety-Critical Automotive Embedded Systems -- Resilience -- Resilience in the Aviation System -- Resilience Markers for Safer Systems and Organisations -- Modeling and Analyzing Disaster Recovery Plans as Business Processes -- Fault Tolerance -- Analysis of Nested CRC with Additional Net Data in Communication -- Symbolic Reliability Analysis of Self-healing Networked Embedded Systems -- Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers -- Security -- Secure Interaction Models for the HealthAgents System -- Security Challenges in Adaptive e-Health Processes -- An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest -- Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures -- Safety Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information -- Applying Safety Goals to a New Intensive Care Workstation System -- Safety Assurance Strategies for Autonomous Vehicles -- Expert Assessment of Arguments: A Method and Its Experimental Evaluation -- Formal Methods -- Formal Verification by Reverse Synthesis -- Deriving Safety Software Requirements from an AltaRica System Model -- Model-Based Implementation of Real-Time Systems -- Early Prototyping of Wireless Sensor Network Algorithms in PVS -- Dependability Modelling -- Analyzing Fault Susceptibility of ABS Microcontroller -- A Formal Approach for User Interaction Reconfiguration of Safety Critical Interactive Systems -- The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects -- Security and Dependability -- A Context-Aware Mandatory Access Control Model for Multilevel Security Environments -- Formal Security Analysis of Electronic Software Distribution Systems -- The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling -- Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems. |
Record Nr. | UNINA-9910483216303321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer safety, reliability, and security : 27th international conference, Safecomp 2008 Newcastle upon Tyne, UK, September 22-25, 2008 proceedings / / Michael D. Harrison, Mark-Alexander Sujan (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (XIV, 456 p.) |
Disciplina | 005.1 |
Collana | Programming and Software Engineering |
Soggetto topico |
Computer software - Reliability
Computer security |
ISBN | 3-540-87698-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Papers -- Critical Information Infrastructures: Should Models Represent Structures or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk -- Panel: Complexity and Resilience -- Software Dependability -- The Effectiveness of T-Way Test Data Generation -- Towards Agile Engineering of High-Integrity Systems -- SafeSpection – A Systematic Customization Approach for Software Hazard Identification -- Integrating Safety Analyses and Component-Based Design -- Modelling Support for Design of Safety-Critical Automotive Embedded Systems -- Resilience -- Resilience in the Aviation System -- Resilience Markers for Safer Systems and Organisations -- Modeling and Analyzing Disaster Recovery Plans as Business Processes -- Fault Tolerance -- Analysis of Nested CRC with Additional Net Data in Communication -- Symbolic Reliability Analysis of Self-healing Networked Embedded Systems -- Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers -- Security -- Secure Interaction Models for the HealthAgents System -- Security Challenges in Adaptive e-Health Processes -- An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest -- Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures -- Safety Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information -- Applying Safety Goals to a New Intensive Care Workstation System -- Safety Assurance Strategies for Autonomous Vehicles -- Expert Assessment of Arguments: A Method and Its Experimental Evaluation -- Formal Methods -- Formal Verification by Reverse Synthesis -- Deriving Safety Software Requirements from an AltaRica System Model -- Model-Based Implementation of Real-Time Systems -- Early Prototyping of Wireless Sensor Network Algorithms in PVS -- Dependability Modelling -- Analyzing Fault Susceptibility of ABS Microcontroller -- A Formal Approach for User Interaction Reconfiguration of Safety Critical Interactive Systems -- The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects -- Security and Dependability -- A Context-Aware Mandatory Access Control Model for Multilevel Security Environments -- Formal Security Analysis of Electronic Software Distribution Systems -- The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling -- Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems. |
Record Nr. | UNISA-996466091303316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|