Górski | Computer Safety, Reliability, and Security | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 442 Seiten, eBook

Reihe: Programming and Software Engineering

Górski Computer Safety, Reliability, and Security

25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings
2006
ISBN: 978-3-540-45763-3
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings

E-Book, Englisch, 442 Seiten, eBook

Reihe: Programming and Software Engineering

ISBN: 978-3-540-45763-3
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the refereed proceedings of the 25th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2006. The 32 revised full papers were carefully reviewed and selected from 101 submissions. Topical sections include systems of systems, security and survivability analysis, nuclear safety and application of standards, formal approaches, networks dependability, coping with change and mobility, safety analysis and assessment, 6th FP integrated project DECOS, and modelling.

Górski Computer Safety, Reliability, and Security jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Systems of Systems.- System of Systems Hazard Analysis Using Simulation and Machine Learning.- Through the Description of Attacks: A Multidimensional View.- On Certain Behavior of Scale-Free Networks Under Malicious Attacks.- Security and Survivability Analysis.- Verifying a Chipcard-Based Biometric Identification Protocol in VSE.- Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry.- Computer System Survivability Modelling by Using Stochastic Activity Network.- Nuclear Safety and Application of Standards.- Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant.- Regulatory Software Configuration Management System Design.- Gaining Confidence in the Software Development Process Using Expert Systems.- Formal Approaches.- Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems.- Stepwise Development of Secure Systems.- Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfiguration.- Networks Dependability.- New VoIP Traffic Security Scheme with Digital Watermarking.- Towards Filtering and Alerting Rule Rewriting on Single-Component Policies.- Using Group Overlapping to Protect Server from Attack in Grid Computing.- Coping with Change and Mobility.- The Role of Situation Awareness in Assuring Safety of Autonomous Vehicles.- Demonstration of Safety in Healthcare Organisations.- Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks.- Safety Analysis and Assessment.- Assessment of Hazard Identification Methods for the Automotive Domain.- A Tool for Databus Safety Analysis Using Fault Injection.- Towards a Unified Model-Based Safety Assessment.- Poster Session.- Reliability Analysis of Resilient Packet Rings.- Experiences with the Design of a Run-Time Check.- Development of an Integrated, Risk-Based Platform for Information and E-Services Security.- Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems.- Verification of Automatic Train Protection Systems with RTCP-Nets.- 6th FP Integrated Project DECOS.- Checking SCADE Models for Correct Usage of Physical Units.- Validation and Certification of Safety-Critical Embedded Systems – The DECOS Test Bench.- Encapsulating Application Subsystems Using the DECOS Core OS.- Modelling.- Modeling the Railway Control Domain Rigorously with a UML 2.0 Profile.- Access Control Coherence of Information Systems Based on Security Constraints.- Automatic Test Data Generation by Multi-objective Optimisation.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.