000 05864nam a22006375i 4500
001 978-3-540-87698-4
003 DE-He213
005 20240423125901.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 _a9783540876984
_9978-3-540-87698-4
024 7 _a10.1007/978-3-540-87698-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aComputer Safety, Reliability, and Security
_h[electronic resource] :
_b27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings /
_cedited by Michael Douglas Harrison, Mark-Alexander Sujan.
250 _a1st ed. 2008.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2008.
300 _aXIV, 456 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aProgramming and Software Engineering,
_x2945-9168 ;
_v5219
505 0 _aKeynote Papers -- Critical Information Infrastructures: Should Models Represent Structures or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk -- Panel: Complexity and Resilience -- Software Dependability -- The Effectiveness of T-Way Test Data Generation -- Towards Agile Engineering of High-Integrity Systems -- SafeSpection – A Systematic Customization Approach for Software Hazard Identification -- Integrating Safety Analyses and Component-Based Design -- Modelling Support for Design of Safety-Critical Automotive Embedded Systems -- Resilience -- Resilience in the Aviation System -- Resilience Markers for Safer Systems and Organisations -- Modeling and Analyzing Disaster Recovery Plans as Business Processes -- Fault Tolerance -- Analysis of Nested CRC with Additional Net Data in Communication -- Symbolic Reliability Analysis of Self-healing Networked Embedded Systems -- Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers -- Security -- Secure Interaction Models for the HealthAgents System -- Security Challenges in Adaptive e-Health Processes -- An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest -- Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures -- Safety Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information -- Applying Safety Goals to a New Intensive Care Workstation System -- Safety Assurance Strategies for Autonomous Vehicles -- Expert Assessment ofArguments: A Method and Its Experimental Evaluation -- Formal Methods -- Formal Verification by Reverse Synthesis -- Deriving Safety Software Requirements from an AltaRica System Model -- Model-Based Implementation of Real-Time Systems -- Early Prototyping of Wireless Sensor Network Algorithms in PVS -- Dependability Modelling -- Analyzing Fault Susceptibility of ABS Microcontroller -- A Formal Approach for User Interaction Reconfiguration of Safety Critical Interactive Systems -- The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects -- Security and Dependability -- A Context-Aware Mandatory Access Control Model for Multilevel Security Environments -- Formal Security Analysis of Electronic Software Distribution Systems -- The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling -- Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems.
520 _aThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, held in Newcastle upon Tyne, UK, in September 2008. The 32 revised full papers presented together with 3 keynote papers and a panel session were carefully reviewed and selected from 115 submissions. The papers are organized in topical sections on software dependability, resilience, fault tolerance, security, safety cases, formal methods, dependability modelling, as well as security and dependability.
650 0 _aComputer networks .
650 0 _aSoftware engineering.
650 0 _aCoding theory.
650 0 _aInformation theory.
650 0 _aData protection.
650 0 _aComputers, Special purpose.
650 0 _aComputer science.
650 1 4 _aComputer Communication Networks.
650 2 4 _aSoftware Engineering.
650 2 4 _aCoding and Information Theory.
650 2 4 _aData and Information Security.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aComputer Science Logic and Foundations of Programming.
700 1 _aHarrison, Michael Douglas.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSujan, Mark-Alexander.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540876977
776 0 8 _iPrinted edition:
_z9783540877233
830 0 _aProgramming and Software Engineering,
_x2945-9168 ;
_v5219
856 4 0 _uhttps://doi.org/10.1007/978-3-540-87698-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c182717
_d182717