000 06563nam a22006015i 4500
001 978-3-540-45763-3
003 DE-He213
005 20240423125650.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 _a9783540457633
_9978-3-540-45763-3
024 7 _a10.1007/11875567
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051230
_2bisacsh
072 7 _aUMZ
_2thema
082 0 4 _a005.1
_223
245 1 0 _aComputer Safety, Reliability, and Security
_h[electronic resource] :
_b25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings /
_cedited by Janusz Górski.
250 _a1st ed. 2006.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2006.
300 _aXIV, 442 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aProgramming and Software Engineering,
_x2945-9168 ;
_v4166
505 0 _aSystems of Systems -- System of Systems Hazard Analysis Using Simulation and Machine Learning -- Through the Description of Attacks: A Multidimensional View -- On Certain Behavior of Scale-Free Networks Under Malicious Attacks -- Security and Survivability Analysis -- Verifying a Chipcard-Based Biometric Identification Protocol in VSE -- Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry -- Computer System Survivability Modelling by Using Stochastic Activity Network -- Nuclear Safety and Application of Standards -- Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant -- Regulatory Software Configuration Management System Design -- Gaining Confidence in the Software Development Process Using Expert Systems -- Formal Approaches -- Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems -- Stepwise Development of Secure Systems -- Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfiguration -- Networks Dependability -- New VoIP Traffic Security Scheme with Digital Watermarking -- Towards Filtering and Alerting Rule Rewriting on Single-Component Policies -- Using Group Overlapping to Protect Server from Attack in Grid Computing -- Coping with Change and Mobility -- The Role of Situation Awareness in Assuring Safety of Autonomous Vehicles -- Demonstration of Safety in Healthcare Organisations -- Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks -- Safety Analysis and Assessment -- Assessment of Hazard Identification Methods for the Automotive Domain -- A Tool for Databus Safety Analysis Using Fault Injection -- Towards a Unified Model-Based Safety Assessment -- Poster Session -- Reliability Analysis ofResilient Packet Rings -- Experiences with the Design of a Run-Time Check -- Development of an Integrated, Risk-Based Platform for Information and E-Services Security -- Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems -- Verification of Automatic Train Protection Systems with RTCP-Nets -- 6th FP Integrated Project DECOS -- Checking SCADE Models for Correct Usage of Physical Units -- Validation and Certification of Safety-Critical Embedded Systems – The DECOS Test Bench -- Encapsulating Application Subsystems Using the DECOS Core OS -- Modelling -- Modeling the Railway Control Domain Rigorously with a UML 2.0 Profile -- Access Control Coherence of Information Systems Based on Security Constraints -- Automatic Test Data Generation by Multi-objective Optimisation.
520 _aWelcome to SAFECOMP 2006, the 25th International Conference on Computer Safety, Security and Reliability, held in Gdansk,Poland. Since it was established in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP has continuously contributed to the progress in high integrity applications of information technologies. The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability of critical IT systems and applications and serves as a platform for knowledge and technology transfer for researchers, industry (suppliers, operators, users), regulators and certi?ers of such systems. SAFECOMP provides ample opportunity to exchange insights and experiences on emerging methods, approaches and practical so- tions to safety, security and reliability problems across the borders of di?erent application domains and technologies. The SAFECOMP 2006 program re?ected in this book included 32 papers selected from 101 submissions of full texts. The submissions came from authors representing 26 di?erent countries from Europe, Asia, and North and South America. The 32 accepted papers were prepared by experts representing 14 d- ferent countries. The above data con?rm the broad and increasing interest in SAFECOMP and the topics addressed. The program was supplemented by three keynote presentations by outsta- ing invited experts (not included in this book). The keynotes focused on - terdisciplinary aspects of dependability of computer systems, practical aspects of application of safety standards and new challenges of information security research and development.
650 0 _aSoftware engineering.
650 0 _aCoding theory.
650 0 _aInformation theory.
650 0 _aComputers, Special purpose.
650 0 _aComputer science.
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aSoftware Engineering.
650 2 4 _aCoding and Information Theory.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aComputer Science Logic and Foundations of Programming.
650 2 4 _aIT Operations.
700 1 _aGórski, Janusz.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540457626
776 0 8 _iPrinted edition:
_z9783540830863
830 0 _aProgramming and Software Engineering,
_x2945-9168 ;
_v4166
856 4 0 _uhttps://doi.org/10.1007/11875567
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c180424
_d180424