top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer safety, reliability, and security : 27th international conference, Safecomp 2008 Newcastle upon Tyne, UK, September 22-25, 2008 proceedings / / Michael D. Harrison, Mark-Alexander Sujan (eds.)
Computer safety, reliability, and security : 27th international conference, Safecomp 2008 Newcastle upon Tyne, UK, September 22-25, 2008 proceedings / / Michael D. Harrison, Mark-Alexander Sujan (eds.)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XIV, 456 p.)
Disciplina 005.1
Collana Programming and Software Engineering
Soggetto topico Computer software - Reliability
Computer security
ISBN 3-540-87698-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Papers -- Critical Information Infrastructures: Should Models Represent Structures or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk -- Panel: Complexity and Resilience -- Software Dependability -- The Effectiveness of T-Way Test Data Generation -- Towards Agile Engineering of High-Integrity Systems -- SafeSpection – A Systematic Customization Approach for Software Hazard Identification -- Integrating Safety Analyses and Component-Based Design -- Modelling Support for Design of Safety-Critical Automotive Embedded Systems -- Resilience -- Resilience in the Aviation System -- Resilience Markers for Safer Systems and Organisations -- Modeling and Analyzing Disaster Recovery Plans as Business Processes -- Fault Tolerance -- Analysis of Nested CRC with Additional Net Data in Communication -- Symbolic Reliability Analysis of Self-healing Networked Embedded Systems -- Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers -- Security -- Secure Interaction Models for the HealthAgents System -- Security Challenges in Adaptive e-Health Processes -- An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest -- Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures -- Safety Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information -- Applying Safety Goals to a New Intensive Care Workstation System -- Safety Assurance Strategies for Autonomous Vehicles -- Expert Assessment of Arguments: A Method and Its Experimental Evaluation -- Formal Methods -- Formal Verification by Reverse Synthesis -- Deriving Safety Software Requirements from an AltaRica System Model -- Model-Based Implementation of Real-Time Systems -- Early Prototyping of Wireless Sensor Network Algorithms in PVS -- Dependability Modelling -- Analyzing Fault Susceptibility of ABS Microcontroller -- A Formal Approach for User Interaction Reconfiguration of Safety Critical Interactive Systems -- The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects -- Security and Dependability -- A Context-Aware Mandatory Access Control Model for Multilevel Security Environments -- Formal Security Analysis of Electronic Software Distribution Systems -- The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling -- Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems.
Record Nr. UNINA-9910483216303321
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer safety, reliability, and security : 27th international conference, Safecomp 2008 Newcastle upon Tyne, UK, September 22-25, 2008 proceedings / / Michael D. Harrison, Mark-Alexander Sujan (eds.)
Computer safety, reliability, and security : 27th international conference, Safecomp 2008 Newcastle upon Tyne, UK, September 22-25, 2008 proceedings / / Michael D. Harrison, Mark-Alexander Sujan (eds.)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XIV, 456 p.)
Disciplina 005.1
Collana Programming and Software Engineering
Soggetto topico Computer software - Reliability
Computer security
ISBN 3-540-87698-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Papers -- Critical Information Infrastructures: Should Models Represent Structures or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk -- Panel: Complexity and Resilience -- Software Dependability -- The Effectiveness of T-Way Test Data Generation -- Towards Agile Engineering of High-Integrity Systems -- SafeSpection – A Systematic Customization Approach for Software Hazard Identification -- Integrating Safety Analyses and Component-Based Design -- Modelling Support for Design of Safety-Critical Automotive Embedded Systems -- Resilience -- Resilience in the Aviation System -- Resilience Markers for Safer Systems and Organisations -- Modeling and Analyzing Disaster Recovery Plans as Business Processes -- Fault Tolerance -- Analysis of Nested CRC with Additional Net Data in Communication -- Symbolic Reliability Analysis of Self-healing Networked Embedded Systems -- Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers -- Security -- Secure Interaction Models for the HealthAgents System -- Security Challenges in Adaptive e-Health Processes -- An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest -- Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures -- Safety Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information -- Applying Safety Goals to a New Intensive Care Workstation System -- Safety Assurance Strategies for Autonomous Vehicles -- Expert Assessment of Arguments: A Method and Its Experimental Evaluation -- Formal Methods -- Formal Verification by Reverse Synthesis -- Deriving Safety Software Requirements from an AltaRica System Model -- Model-Based Implementation of Real-Time Systems -- Early Prototyping of Wireless Sensor Network Algorithms in PVS -- Dependability Modelling -- Analyzing Fault Susceptibility of ABS Microcontroller -- A Formal Approach for User Interaction Reconfiguration of Safety Critical Interactive Systems -- The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects -- Security and Dependability -- A Context-Aware Mandatory Access Control Model for Multilevel Security Environments -- Formal Security Analysis of Electronic Software Distribution Systems -- The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling -- Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems.
Record Nr. UNISA-996466091303316
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui