default search action
27th SAFECOMP 2008: Newcastle upon Tyne, UK
- Michael D. Harrison, Mark-Alexander Sujan:
Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings. Lecture Notes in Computer Science 5219, Springer 2008, ISBN 978-3-540-87697-7
Keynote Papers
- Erik Hollnagel:
Critical Information Infrastructures: Should Models Represent Structures or Functions? 1-4 - Colin O'Halloran, Andy Bates:
Security and Interoperability for MANETs and a Fixed Core. 5-11 - Roger Rivett:
Technology, Society and Risk. 12 - Aad P. A. van Moorsel:
Panel: Complexity and Resilience. 13-15
Software Dependability
- Michael Ellims, Darrel C. Ince, Marian Petre:
The Effectiveness of T-Way Test Data Generation. 16-29 - Richard F. Paige, Ramon Charalambous, Xiaocheng Ge, Phillip J. Brooke:
Towards Agile Engineering of High-Integrity Systems. 30-43 - Christian Denger, Mario Trapp, Peter Liggesmeyer:
SafeSpection - A Systematic Customization Approach for Software Hazard Identification. 44-57 - Dominik Domis, Mario Trapp:
Integrating Safety Analyses and Component-Based Design. 58-71 - De-Jiu Chen, Rolf Johansson, Henrik Lönn, Yiannis Papadopoulos, Anders Sandberg, Fredrik Törner, Martin Törngren:
Modelling Support for Design of Safety-Critical Automotive Embedded Systems. 72-85
Resilience
- Antonio Chialastri, Simone Pozzi:
Resilience in the Aviation System. 86-98 - Jonathan Back, Dominic Furniss, Michael Hildebrandt, Ann Blandford:
Resilience Markers for Safer Systems and Organisations. 99-112 - Andrzej Zalewski, Piotr Sztandera, Marcin Ludzia, Marek Zalewski:
Modeling and Analyzing Disaster Recovery Plans as Business Processes. 113-125
Fault Tolerance
- Tina Mattes, Frank Schiller, Annemarie Mörwald, Thomas Honold:
Analysis of Nested CRC with Additional Net Data in Communication. 126-138 - Michael Glaß, Martin Lukasiewycz, Felix Reimann, Christian Haubelt, Jürgen Teich:
Symbolic Reliability Analysis of Self-healing Networked Embedded Systems. 139-152 - Yasser Sedaghat, Seyed Ghassem Miremadi:
Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers. 153-166
Security
- Liang Xiao, Paul H. Lewis, Srinandan Dasmahapatra:
Secure Interaction Models for the HealthAgents System. 167-180 - Michael Predeschly, Peter Dadam, Hilmar Acker:
Security Challenges in Adaptive e-Health Processes. 181-192 - Abdullah M. S. Alaraj, Malcolm Munro:
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. 193-206 - Dennis K. Nilsson, Ulf Larson, Erland Jonsson:
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles. 207-220 - Danielle Chrun, Michel Cukier, Gerry Sneeringer:
Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. 221-234 - Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. 235-248
Safety Cases
- Nurlida Basir, Ewen Denney, Bernd Fischer:
Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information. 249-262 - Uwe Becker:
Applying Safety Goals to a New Intensive Care Workstation System. 263-276 - Andrzej Wardzinski:
Safety Assurance Strategies for Autonomous Vehicles. 277-290 - Lukasz Cyra, Janusz Górski:
Expert Assessment of Arguments: A Method and Its Experimental Evaluation. 291-304
Formal Methods
- Xiang Yin, John C. Knight, Elisabeth A. Nguyen, Westley Weimer:
Formal Verification by Reverse Synthesis. 305-319 - Sophie Humbert, Christel Seguin, Charles Castel, Jean-Marc Bosc:
Deriving Safety Software Requirements from an AltaRica System Model. 320-331 - Krzysztof Sacha:
Model-Based Implementation of Real-Time Systems. 332-345 - Cinzia Bernardeschi, Paolo Masci, Holger Pfeifer:
Early Prototyping of Wireless Sensor Network Algorithms in PVS. 346-359
Dependability Modelling
- Dawid Trawczynski, Janusz Sosnowski, Piotr Gawkowski:
Analyzing Fault Susceptibility of ABS Microcontroller. 360-372 - Alberto Pasquini, Simone Pozzi, Luca Save:
The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects. 387-400
Security and Dependability
- Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili:
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. 401-414 - Monika Maidl, David von Oheimb, Peter Hartmann, Richard Robinson:
Formal Security Analysis of Electronic Software Distribution Systems. 415-428 - Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin:
The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling. 429-439 - Ayman K. Gendy, Michael J. Pont:
Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems. 440-453
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.