Atnaujinkite slapukų nuostatas

Computer Safety, Reliability, and Security: 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings 2008 ed. [Minkštas viršelis]

  • Formatas: Paperback / softback, 456 pages, aukštis x plotis: 235x155 mm, weight: 718 g, 130 Illustrations, black and white; XIV, 456 p. 130 illus., 1 Paperback / softback
  • Serija: Lecture Notes in Computer Science 5219
  • Išleidimo metai: 11-Sep-2008
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540876979
  • ISBN-13: 9783540876977
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 456 pages, aukštis x plotis: 235x155 mm, weight: 718 g, 130 Illustrations, black and white; XIV, 456 p. 130 illus., 1 Paperback / softback
  • Serija: Lecture Notes in Computer Science 5219
  • Išleidimo metai: 11-Sep-2008
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540876979
  • ISBN-13: 9783540876977
Kitos knygos pagal šią temą:
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, held in Newcastle upon Tyne, UK, in September 2008.
The 32 revised full papers presented together with 3 keynote papers and a panel session were carefully reviewed and selected from 115 submissions. The papers are organized in topical sections on software dependability, resilience, fault tolerance, security, safety cases, formal methods, dependability modelling, as well as security and dependability.

Constitutes the proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, held in Newcastle upon Tyne, UK, in September 2008. This title organizes the papers in topical sections on software dependability, resilience, fault tolerance, security, safety cases, and formal methods.

Safecomp washeld in Newcastleupon Tyne,UK in September 2008.The conf- ence was the latest in a long and strong tradition of leading-edge research and practice in Computer Safety, Reliability and Security that began in 1979. The programme was drawn from a strong international selection of papers from a dozen countries in three continents (32 papers from 115 submissions). Traditional Safecomp themes such as software dependability, software safety - guments and formal methods continued to be represented. This conference also strengthened themes that have been less visible in previous Safecomp conf- ences, particularly those relating to the complexity and resilience of systems, critical infrastructures and human factors. It broadened the usual domains of application to include, for example, e-Commerce. The programme continued to bene t fromstrongindustrialcontributionsin safetycriticalandsecuritycritical applications. We were fortunate to have keynote addresses from Colin O’Halloran (Qi- tiQ) and Roger Rivett (LandRover)on di erent complementary industrial ex- riences in security and reliability. We were also fortunate to have Erik Hollnagel as our opening keynote speaker. Professor Hollnagel’s contribution was e - tive in challenging traditional views, broadening the focus of concern, especially relating to the management and analysis of complexity in large-scale systems.
Keynote Papers.- Critical Information Infrastructures: Should Models
Represent Structures or Functions?.- Security and Interoperability for MANETs
and a Fixed Core.- Technology, Society and Risk.- Panel: Complexity and
Resilience.- Software Dependability.- The Effectiveness of T-Way Test Data
Generation.- Towards Agile Engineering of High-Integrity Systems.-
SafeSpection A Systematic Customization Approach for Software Hazard
Identification.- Integrating Safety Analyses and Component-Based Design.-
Modelling Support for Design of Safety-Critical Automotive Embedded Systems.-
Resilience.- Resilience in the Aviation System.- Resilience Markers for Safer
Systems and Organisations.- Modeling and Analyzing Disaster Recovery Plans as
Business Processes.- Fault Tolerance.- Analysis of Nested CRC with Additional
Net Data in Communication.- Symbolic Reliability Analysis of Self-healing
Networked Embedded Systems.- Investigation and Reduction of Fault Sensitivity
in the FlexRay Communication Controller Registers.- Security.- Secure
Interaction Models for the HealthAgents System.- Security Challenges in
Adaptive e-Health Processes.- An Efficient e-Commerce Fair Exchange Protocol
That Encourages Customer and Merchant to Be Honest.- Creating a Secure
Infrastructure for Wireless Diagnostics and Software Updates in Vehicles.-
Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event
Data.- Security Threats to Automotive CAN Networks Practical Examples and
Selected Short-Term Countermeasures.- Safety Cases.- Constructing a Safety
Case for Automatically Generated Code from Formal Program Verification
Information.- Applying Safety Goals to a New Intensive Care Workstation
System.- Safety Assurance Strategies for Autonomous Vehicles.- Expert
Assessment ofArguments: A Method and Its Experimental Evaluation.- Formal
Methods.- Formal Verification by Reverse Synthesis.- Deriving Safety Software
Requirements from an AltaRica System Model.- Model-Based Implementation of
Real-Time Systems.- Early Prototyping of Wireless Sensor Network Algorithms
in PVS.- Dependability Modelling.- Analyzing Fault Susceptibility of ABS
Microcontroller.- A Formal Approach for User Interaction Reconfiguration of
Safety Critical Interactive Systems.- The Wrong Question to the Right People.
A Critical View of Severity Classification Methods in ATM Experimental
Projects.- Security and Dependability.- A Context-Aware Mandatory Access
Control Model for Multilevel Security Environments.- Formal Security Analysis
of Electronic Software Distribution Systems.- The Advanced Electric Power
Grid: Complexity Reduction Techniques for Reliability Modeling.- Automating
the Processes of Selecting an Appropriate Scheduling Algorithm and
Configuring the Scheduler Implementation for Time-Triggered Embedded Systems.