000 | 06653nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-540-45763-3 | ||
003 | DE-He213 | ||
005 | 20240730183803.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 gw | s |||| 0|eng d | ||
020 |
_a9783540457633 _9978-3-540-45763-3 |
||
024 | 7 |
_a10.1007/11875567 _2doi |
|
050 | 4 | _aQA76.758 | |
072 | 7 |
_aUMZ _2bicssc |
|
072 | 7 |
_aCOM051230 _2bisacsh |
|
072 | 7 |
_aUMZ _2thema |
|
082 | 0 | 4 |
_a005.1 _223 |
245 | 1 | 0 |
_aComputer Safety, Reliability, and Security _h[electronic resource] : _b25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings / _cedited by Janusz Górski. |
250 | _a1st ed. 2006. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2006. |
|
300 |
_aXIV, 442 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aProgramming and Software Engineering, _x2945-9168 ; _v4166 |
|
505 | 0 | _aSystems of Systems -- System of Systems Hazard Analysis Using Simulation and Machine Learning -- Through the Description of Attacks: A Multidimensional View -- On Certain Behavior of Scale-Free Networks Under Malicious Attacks -- Security and Survivability Analysis -- Verifying a Chipcard-Based Biometric Identification Protocol in VSE -- Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry -- Computer System Survivability Modelling by Using Stochastic Activity Network -- Nuclear Safety and Application of Standards -- Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant -- Regulatory Software Configuration Management System Design -- Gaining Confidence in the Software Development Process Using Expert Systems -- Formal Approaches -- Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems -- Stepwise Development of Secure Systems -- Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfiguration -- Networks Dependability -- New VoIP Traffic Security Scheme with Digital Watermarking -- Towards Filtering and Alerting Rule Rewriting on Single-Component Policies -- Using Group Overlapping to Protect Server from Attack in Grid Computing -- Coping with Change and Mobility -- The Role of Situation Awareness in Assuring Safety of Autonomous Vehicles -- Demonstration of Safety in Healthcare Organisations -- Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks -- Safety Analysis and Assessment -- Assessment of Hazard Identification Methods for the Automotive Domain -- A Tool for Databus Safety Analysis Using Fault Injection -- Towards a Unified Model-Based Safety Assessment -- Poster Session -- Reliability Analysis ofResilient Packet Rings -- Experiences with the Design of a Run-Time Check -- Development of an Integrated, Risk-Based Platform for Information and E-Services Security -- Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems -- Verification of Automatic Train Protection Systems with RTCP-Nets -- 6th FP Integrated Project DECOS -- Checking SCADE Models for Correct Usage of Physical Units -- Validation and Certification of Safety-Critical Embedded Systems - The DECOS Test Bench -- Encapsulating Application Subsystems Using the DECOS Core OS -- Modelling -- Modeling the Railway Control Domain Rigorously with a UML 2.0 Profile -- Access Control Coherence of Information Systems Based on Security Constraints -- Automatic Test Data Generation by Multi-objective Optimisation. | |
520 | _aWelcome to SAFECOMP 2006, the 25th International Conference on Computer Safety, Security and Reliability, held in Gdansk,Poland. Since it was established in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP has continuously contributed to the progress in high integrity applications of information technologies. The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability of critical IT systems and applications and serves as a platform for knowledge and technology transfer for researchers, industry (suppliers, operators, users), regulators and certi?ers of such systems. SAFECOMP provides ample opportunity to exchange insights and experiences on emerging methods, approaches and practical so- tions to safety, security and reliability problems across the borders of di?erent application domains and technologies. The SAFECOMP 2006 program re?ected in this book included 32 papers selected from 101 submissions of full texts. The submissions came from authors representing 26 di?erent countries from Europe, Asia, and North and South America. The 32 accepted papers were prepared by experts representing 14 d- ferent countries. The above data con?rm the broad and increasing interest in SAFECOMP and the topics addressed. The program was supplemented by three keynote presentations by outsta- ing invited experts (not included in this book). The keynotes focused on - terdisciplinary aspects of dependability of computer systems, practical aspects of application of safety standards and new challenges of information security research and development. | ||
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aComputers, Special purpose. _946653 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9133435 |
|
650 | 1 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aCoding and Information Theory. _9133436 |
650 | 2 | 4 |
_aSpecial Purpose and Application-Based Systems. _946654 |
650 | 2 | 4 |
_aComputer Science Logic and Foundations of Programming. _942203 |
650 | 2 | 4 |
_aIT Operations. _931703 |
700 | 1 |
_aGórski, Janusz. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9133437 |
|
710 | 2 |
_aSpringerLink (Online service) _9133438 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540457626 |
776 | 0 | 8 |
_iPrinted edition: _z9783540830863 |
830 | 0 |
_aProgramming and Software Engineering, _x2945-9168 ; _v4166 _9133439 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/11875567 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92046 _d92046 |