My Account Log in

1 option

Computer Safety, Reliability, and Security : 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings / edited by Janusz Górski.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024)
Format:
Book
Contributor:
Górski, Janusz, 1948- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Programming and software engineering ; SL 2, 4166.
Programming and Software Engineering ; 4166
Language:
English
Subjects (All):
Software engineering.
Coding theory.
Information theory.
Computers, Special purpose.
Computer logic.
Management information systems.
Computer science.
Software Engineering/Programming and Operating Systems.
Coding and Information Theory.
Special Purpose and Application-Based Systems.
Logics and Meanings of Programs.
Management of Computing and Information Systems.
Local Subjects:
Software Engineering/Programming and Operating Systems.
Coding and Information Theory.
Special Purpose and Application-Based Systems.
Logics and Meanings of Programs.
Management of Computing and Information Systems.
Physical Description:
1 online resource (XIV, 442 pages).
Edition:
First edition 2006.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
System Details:
text file PDF
Summary:
Welcome to SAFECOMP 2006, the 25th International Conference on Computer Safety, Security and Reliability, held in Gdansk,Poland. Since it was established in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP has continuously contributed to the progress in high integrity applications of information technologies. The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability of critical IT systems and applications and serves as a platform for knowledge and technology transfer for researchers, industry (suppliers, operators, users), regulators and certi?ers of such systems. SAFECOMP provides ample opportunity to exchange insights and experiences on emerging methods, approaches and practical so- tions to safety, security and reliability problems across the borders of di?erent application domains and technologies. The SAFECOMP 2006 program re?ected in this book included 32 papers selected from 101 submissions of full texts. The submissions came from authors representing 26 di?erent countries from Europe, Asia, and North and South America. The 32 accepted papers were prepared by experts representing 14 d- ferent countries. The above data con?rm the broad and increasing interest in SAFECOMP and the topics addressed. The program was supplemented by three keynote presentations by outsta- ing invited experts (not included in this book). The keynotes focused on - terdisciplinary aspects of dependability of computer systems, practical aspects of application of safety standards and new challenges of information security research and development.
Contents:
Systems of Systems
System of Systems Hazard Analysis Using Simulation and Machine Learning
Through the Description of Attacks: A Multidimensional View
On Certain Behavior of Scale-Free Networks Under Malicious Attacks
Security and Survivability Analysis
Verifying a Chipcard-Based Biometric Identification Protocol in VSE
Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry
Computer System Survivability Modelling by Using Stochastic Activity Network
Nuclear Safety and Application of Standards
Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant
Regulatory Software Configuration Management System Design
Gaining Confidence in the Software Development Process Using Expert Systems
Formal Approaches
Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems
Stepwise Development of Secure Systems
Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfiguration
Networks Dependability
New VoIP Traffic Security Scheme with Digital Watermarking
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies
Using Group Overlapping to Protect Server from Attack in Grid Computing
Coping with Change and Mobility
The Role of Situation Awareness in Assuring Safety of Autonomous Vehicles
Demonstration of Safety in Healthcare Organisations
Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks
Safety Analysis and Assessment
Assessment of Hazard Identification Methods for the Automotive Domain
A Tool for Databus Safety Analysis Using Fault Injection
Towards a Unified Model-Based Safety Assessment
Poster Session
Reliability Analysis of Resilient Packet Rings
Experiences with the Design of a Run-Time Check
Development of an Integrated, Risk-Based Platform for Information and E-Services Security
Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems
Verification of Automatic Train Protection Systems with RTCP-Nets
6th FP Integrated Project DECOS
Checking SCADE Models for Correct Usage of Physical Units
Validation and Certification of Safety-Critical Embedded Systems - The DECOS Test Bench
Encapsulating Application Subsystems Using the DECOS Core OS
Modelling
Modeling the Railway Control Domain Rigorously with a UML 2.0 Profile
Access Control Coherence of Information Systems Based on Security Constraints
Automatic Test Data Generation by Multi-objective Optimisation.
Other Format:
Printed edition:
ISBN:
978-3-540-45763-3
9783540457633
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account