000 06526nam a22005895i 4500
001 978-3-642-15651-9
003 DE-He213
005 20240423125535.0
007 cr nn 008mamaa
008 100810s2010 gw | s |||| 0|eng d
020 _a9783642156519
_9978-3-642-15651-9
024 7 _a10.1007/978-3-642-15651-9
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051230
_2bisacsh
072 7 _aUMZ
_2thema
082 0 4 _a005.1
_223
245 1 0 _aComputer Safety, Reliability, and Security
_h[electronic resource] :
_b29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings /
_cedited by Erwin Schoitsch.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aX, 482 p. 197 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aProgramming and Software Engineering,
_x2945-9168 ;
_v6351
505 0 _aSession 1 -- Reliability Analysis of Safety-Related Communication Architectures -- A Novel HAZOP Study Approach in the RAMS Analysis of a Therapeutic Robot for Disabled Children -- Variability Management of Safety and Reliability Models: An Intermediate Model towards Systematic Reuse of Component Fault Trees -- QoS Analysis of Weighted Multi-state Probabilistic Networks via Decision Diagrams -- Session 2 -- Comparison between IEC 60880 and IEC 61508 for Certification Purposes in the Nuclear Domain -- Deriving Safety Cases for Hierarchical Structure in Model-Based Development -- Assurance of Automotive Safety – A Safety Case Approach -- How to “Survive” a Safety Case According to ISO 26262 -- Session 3 -- Benchmarking Software Requirements Documentation for Space Application -- Verifying Mode Consistency for On-Board Satellite Software -- Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace -- Session 4 -- Residual Error Probability of Embedded CRC by Stochastic Automata -- ANB- and ANBDmem-Encoding: Detecting Hardware Errors in Software -- Session 5 -- Field Test Methods for a Co-operative Integrated Traffic Management System -- 100% Coverage for Safety-Critical Software – Efficient Testing by Static Analysis -- MODIFI: A MODel-Implemented Fault Injection Tool -- Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function Block Diagram -- Session 6 -- Overcoming Non-determinism in Testing Smart Devices: A Case Study -- Software Testing by People with Autism -- Session 7 -- Information Flow Analysis of Energy Management in a Smart Grid -- Integrated Cyber-Physical Fault Injection for Reliability Analysis of the Smart Grid -- A Metric for Measuring the Strength of Inter-dependencies -- Session 8 -- SecurityAnalysis of Open Building Automation Systems -- A UML Profile for Requirements Analysis of Dependable Software -- Session 9 -- Model-Based Safety Engineering of Interdependent Functions in Automotive Vehicles Using EAST-ADL2 -- Experiences in Applying Formal Verification in Robotics -- Evolving a Safe System Design Iteratively -- An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems -- Session 10 -- Development of High-Integrity Software Product Lines Using Model Transformation -- On the Safety Implications of E-Governance: Assessing the Hazards of Enterprise Information Architectures in Safety-Critical Applications -- The Right Degree of Configurability for Safety-Critical Embedded Software in Variable Message Signs -- INDEXYS, a Logical Step beyond GENESYS -- Session 11 -- Integrating System Modelling with Safety Activities -- Aspect-Oriented Implementation of Fault Tolerance: An Assessment of Overhead -- Invited Talks (Keynote Abstracts) -- System of Systems Challenges -- Murphy Was an Optimist -- Process Control Security: Go Dutch! (United, Shared, Lean and Mean).
520 _aComputers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries. They perform tasks that a few decades ago were very difficult if not impossible. As they perform these tasks with increasing efficiency, more and more tasks are shifted from hardware to software, which means that the dependability of computer systems becomes crucial for the safety, security and reliability of technical systems. With the so-called “embedded systems” (becoming more and more intelligent, networked and co-operating with each other, with humans and the environment) computers have invaded all aspects of daily life. New paradigms have arisen, like ubiquitous computing, systems-of-systems, energy and resource awareness, enormous complexity issues and the like, requiring a more holistic systems view as well. th So, after 31 years of SAFECOMP, the emphasis of the 29 event is on critical - bedded systems, which are almost omnipresent. Their impact on our lives, risks and challenges are often not well understood (underestimated or exaggerated). The p- mary issue is to cope with complexity, new failure modes and resource management, due to shrinking feature size, multi-core systems and management of multiple variants, while maintaining dependability properties and robustness.
650 0 _aSoftware engineering.
650 0 _aData protection.
650 0 _aComputer networks .
650 0 _aAlgorithms.
650 0 _aComputers and civilization.
650 1 4 _aSoftware Engineering.
650 2 4 _aData and Information Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aAlgorithms.
650 2 4 _aComputers and Society.
700 1 _aSchoitsch, Erwin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642156502
776 0 8 _iPrinted edition:
_z9783642156526
830 0 _aProgramming and Software Engineering,
_x2945-9168 ;
_v6351
856 4 0 _uhttps://doi.org/10.1007/978-3-642-15651-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c179064
_d179064