


Остановите войну!
for scientists:


default search action
27th SAFECOMP 2008: Newcastle upon Tyne, UK
- Michael D. Harrison, Mark-Alexander Sujan:
Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings. Lecture Notes in Computer Science 5219, Springer 2008, ISBN 978-3-540-87697-7
Keynote Papers
- Erik Hollnagel:
Critical Information Infrastructures: Should Models Represent Structures or Functions? 1-4 - Colin O'Halloran, Andy Bates:
Security and Interoperability for MANETs and a Fixed Core. 5-11 - Roger Rivett:
Technology, Society and Risk. 12 - Aad P. A. van Moorsel:
Panel: Complexity and Resilience. 13-15
Software Dependability
- Michael Ellims, Darrel C. Ince, Marian Petre:
The Effectiveness of T-Way Test Data Generation. 16-29 - Richard F. Paige, Ramon Charalambous, Xiaocheng Ge
, Phillip J. Brooke:
Towards Agile Engineering of High-Integrity Systems. 30-43 - Christian Denger, Mario Trapp, Peter Liggesmeyer:
SafeSpection - A Systematic Customization Approach for Software Hazard Identification. 44-57 - Dominik Domis, Mario Trapp:
Integrating Safety Analyses and Component-Based Design. 58-71 - De-Jiu Chen, Rolf Johansson, Henrik Lönn, Yiannis Papadopoulos
, Anders Sandberg, Fredrik Törner, Martin Törngren
:
Modelling Support for Design of Safety-Critical Automotive Embedded Systems. 72-85
Resilience
- Antonio Chialastri, Simone Pozzi:
Resilience in the Aviation System. 86-98 - Jonathan Back, Dominic Furniss
, Michael Hildebrandt, Ann Blandford
:
Resilience Markers for Safer Systems and Organisations. 99-112 - Andrzej Zalewski
, Piotr Sztandera, Marcin Ludzia, Marek Zalewski:
Modeling and Analyzing Disaster Recovery Plans as Business Processes. 113-125
Fault Tolerance
- Tina Mattes, Frank Schiller, Annemarie Mörwald, Thomas Honold:
Analysis of Nested CRC with Additional Net Data in Communication. 126-138 - Michael Glaß
, Martin Lukasiewycz, Felix Reimann, Christian Haubelt
, Jürgen Teich:
Symbolic Reliability Analysis of Self-healing Networked Embedded Systems. 139-152 - Yasser Sedaghat
, Seyed Ghassem Miremadi:
Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers. 153-166
Security
- Liang Xiao, Paul H. Lewis, Srinandan Dasmahapatra
:
Secure Interaction Models for the HealthAgents System. 167-180 - Michael Predeschly, Peter Dadam, Hilmar Acker:
Security Challenges in Adaptive e-Health Processes. 181-192 - Abdullah M. S. Alaraj, Malcolm Munro:
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. 193-206 - Dennis K. Nilsson, Ulf Larson, Erland Jonsson:
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles. 207-220 - Danielle Chrun, Michel Cukier, Gerry Sneeringer:
Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. 221-234 - Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. 235-248
Safety Cases
- Nurlida Basir, Ewen Denney, Bernd Fischer
:
Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information. 249-262 - Uwe Becker:
Applying Safety Goals to a New Intensive Care Workstation System. 263-276 - Andrzej Wardzinski:
Safety Assurance Strategies for Autonomous Vehicles. 277-290 - Lukasz Cyra, Janusz Górski
:
Expert Assessment of Arguments: A Method and Its Experimental Evaluation. 291-304
Formal Methods
- Xiang Yin, John C. Knight, Elisabeth A. Nguyen, Westley Weimer:
Formal Verification by Reverse Synthesis. 305-319 - Sophie Humbert, Christel Seguin, Charles Castel, Jean-Marc Bosc:
Deriving Safety Software Requirements from an AltaRica System Model. 320-331 - Krzysztof Sacha:
Model-Based Implementation of Real-Time Systems. 332-345 - Cinzia Bernardeschi
, Paolo Masci
, Holger Pfeifer:
Early Prototyping of Wireless Sensor Network Algorithms in PVS. 346-359
Dependability Modelling
- Dawid Trawczynski, Janusz Sosnowski
, Piotr Gawkowski
:
Analyzing Fault Susceptibility of ABS Microcontroller. 360-372 - Alberto Pasquini, Simone Pozzi, Luca Save:
The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects. 387-400
Security and Dependability
- Jafar Haadi Jafarian, Morteza Amini
, Rasool Jalili:
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. 401-414 - Monika Maidl, David von Oheimb, Peter Hartmann, Richard Robinson:
Formal Security Analysis of Electronic Software Distribution Systems. 415-428 - Ayman Z. Faza, Sahra Sedigh
, Bruce M. McMillin
:
The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling. 429-439 - Ayman K. Gendy, Michael J. Pont:
Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems. 440-453

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.