Safe Comp 97
Springer Berlin (Verlag)
978-3-540-76191-4 (ISBN)
The safe and secure operation ofcomputer systems continues to be the major issue in many applications where there is a threat to people, the environment, investment or goodwill. Such applications include medical devices, railway signalling, energy distribution, vehicle control and monitoring, air traffic control, industrial process control, telecommunications systemsand manyothers. This book represents the proceedings of the 16th International Conference on Computer Safety, Reliability and Security, held in York, UK, 7-10 September 1997. The conference reviews the state ofthe art, experience and new trends in the areas of computer safety, reliability and security. It forms a platform for technology transfer between academia, industry and research institutions. In an expanding world-wide market for safe, secure and reliable computer systems SAFECOMP 97 provides an opportunity for technical developers, users and legislators to exchange and review the experience, to consider the best technologies now available and to identify the skills and technologies required for the future. The papers were carefully selected by the Conference International Programme Committee. The authors of the papers come from twelve different countries. The subjects covered include safe software, safety cases, management & development, security, human factors, guidelines standards & certification, applications & industrial experience, formal methods & models andvalidation, verification and testing. SAFECOMP '97 continues the successful series of SAFECOMP conferences first held in 1979 in Stuttgart. SAFECOMP is organised by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Security and Reliability (EWICS TC7).
Safe Software.- Software-based Safety-critical Systems: a Taxonomy.- Safety Assessment of Software Based Systems.- Safe and Reliable Computer Control Systems: an Overview.- Towards Dependable Software Requirement Specifications.- Safety Cases, Management and Development.- Safety Case Construction and Reuse Using Patterns.- A Systematic Approach to Software Safety Integrity Levels.- Integration of Safety Requirements in the Initial Phases of the Project Lifecycle of Hardware/Software Systems.- Managing the Safety Argument using a Memory Prosthesis.- Security and Human Factors.- Safety and Security Requirements for an Advanced Train Control System.- Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools.- Using Executable Interactor Specifications to Explore the Impact of Operator Interaction Errors.- Design, Analysis and Implementation of a New Hash Function Based on Block Cipher.- Biometric Techniques Applied in Security Technology.- Guidelines, Standards and Certification.- High Integrity Ada.- Towards an Automotive 'Safer Subset' of C.- Computer Based Support for Standards and Processes in Safety Critical Systems.- An Assessment of the IEC 1131-3 Standard on Languages for Programmable Controllers.- Formal Methods and Models.- Refinement and Safety Analysis.- Automated Verification of Safety Requirements using CCS and Binary Decision Diagrams.- Consistency Checking by Type Inference and Constraint Satisfaction.- Safe Combinations of Services using B.- An Object-Based Approach to Modelling and Analysis of Failure Properties.- Methodological Support for Formally Specifying Safety-Critical Software.- Applications and Industrial Experience.- Embedded Systems in Avionics and the SACRES Approach.- Towards SaferIndustrial Computer Controlled Systems.- Safety Cases for Software-intensive Systems: an Industrial Experience Report.- Testing, Validation and Verification.- Dynamic Decision on Checkpointing by Use of Reduced Ordered Binary Decision Diagrams.- Practical Assessment of Neural Network Applications.- Software Test Techniques for System Fault-Tree Analysis.- Author Index.
Erscheint lt. Verlag | 11.9.1997 |
---|---|
Zusatzinfo | XIII, 381 p. 18 illus. |
Verlagsort | London |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 603 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Computer • Design • Development • Embedded Systems • Formal Method • formal methods • Hardware • Modeling • Reliability • Software • Standards • structured analysis • Testing • Validation • verification |
ISBN-10 | 3-540-76191-8 / 3540761918 |
ISBN-13 | 978-3-540-76191-4 / 9783540761914 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich