000 05598nam a22006375i 4500
001 978-3-540-45416-8
003 DE-He213
005 20240423132504.0
007 cr nn 008mamaa
008 121227s2001 gw | s |||| 0|eng d
020 _a9783540454168
_9978-3-540-45416-8
024 7 _a10.1007/3-540-45416-0
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aComputer Safety, Reliability and Security
_h[electronic resource] :
_b20th International Conference, SAFECOMP 2001, Budapest, Hungary, September 26-28, 2001 Proceedings /
_cedited by Udo Voges.
250 _a1st ed. 2001.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2001.
300 _aXVI, 256 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2187
505 0 _aInvited Paper -- Designing Safety into Medical Decisions and Clinical Processes -- Reliability Asessment and Security -- Security Assessments of Safety Critical Systems Using HAZOPs -- Network Security for Substation Automation Systems -- A Bayesian Belief Network for Reliability Assessment -- Safety Case and Safety Analysis -- Checking General Safety Criteria on UML Statecharts -- Presenting a Safety Case — A Case Study — -- Safety Functions versus Control Functions -- Medical Systems -- A Fail-Safe Dual Channel Robot Control for Surgery Applications -- Invited Paper -- Modeling the Human in Human Factors -- Human Machine Interface -- Analyzing Human-Machine Interactions in Safety-Critical Systems: A Basic Applicable Approach -- Analysis of Incidents Involving Interactive Systems -- COTS - Components off the Shelf -- Experimental Evaluation of Fault Handling Mechanisms -- The COTS Debate in Perspective -- Testing -- An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models -- A Comparison Study of the Behavior of Equivalent Algorithms in Fault Injection Experiments in Parallel Superscalar Architectures -- The Effectiveness of Statistical Testing when Applied to Logic Systems -- Formal Methods -- A Classification Scheme for Software Verification Tools with Regard to RTCA/DO-178B -- Safety Patterns — The Key to Formal Specification of Safety Requirements -- Formal Support for Fault Modelling and Analysis -- Project Experience with IEC 61508 and Its Consequences -- Project Experience with IEC 61508 and Its Consequences -- About the Design of Distributed Control Systems: The Quasi-Synchronous approach -- About the Design of Distributed Control Systems: The Quasi-Synchronous Approach -- Dependability Evaluation From Functional to Structural Modelling -- DependabilityEvaluation -- Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems -- Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems.
520 _aThis year we celebrated another anniversary: after 20 years of SAFECOMP in 1999, th this was the 20 SAFECOMP since its inauguration in 1979. This series of events focuses on critical computer applications. It is intended to be a platform for knowledge transfer between academia, industry, and research institutions. Papers are solicited on all aspects of computer systems in which safety, reliability, and security (applied to safety in terms of integrity and availability) are of importance. The 20th SAFECOMP tried to cover new grounds, both thematically and geographically. The previous 19 SAFECOMPs were held in Austria (1989, 1996), France (1987, 1999), Germany (1979, 1988, 1998), Great Britain (1983, 1986, 1990, 1997), Italy (1985, 1995), Norway (1991), Poland (1993), Switzerland (1992), The th Netherlands (2000), and in the USA (1981, 1992), whereas the 20 was held in Hungary. Authors from 13 countries responded to the Call for Papers, and 10 countries were represented in the final program. The proceedings include 20 papers plus 3 invited papers, covering the areas Reliability Assessment and Security, Safety Case and Safety Analysis, Testing, Formal Methods, Control Systems, and this year covering new grounds with a special emphasis on Human Machine Interface, Components off the Shelf, and Medical Systems.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aSoftware engineering.
650 0 _aComputers, Special purpose.
650 0 _aComputer science.
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aCryptology.
650 2 4 _aSoftware Engineering.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aComputer Science Logic and Foundations of Programming.
650 2 4 _aIT Operations.
700 1 _aVoges, Udo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540426073
776 0 8 _iPrinted edition:
_z9783662182437
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2187
856 4 0 _uhttps://doi.org/10.1007/3-540-45416-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188312
_d188312