Atjaunināt sīkdatņu piekrišanu

Computer Safety, Reliability, and Security: 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011, Proceedings 2011 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 482 pages, height x width: 235x155 mm, weight: 744 g, 93 Illustrations, color; 87 Illustrations, black and white; XI, 482 p. 180 illus., 93 illus. in color., 1 Paperback / softback
  • Sērija : Programming and Software Engineering 6894
  • Izdošanas datums: 15-Sep-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642242693
  • ISBN-13: 9783642242694
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 482 pages, height x width: 235x155 mm, weight: 744 g, 93 Illustrations, color; 87 Illustrations, black and white; XI, 482 p. 180 illus., 93 illus. in color., 1 Paperback / softback
  • Sērija : Programming and Software Engineering 6894
  • Izdošanas datums: 15-Sep-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642242693
  • ISBN-13: 9783642242694
This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011.

The 34 full papers presented together were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on RAM evaluation, complex systems dependability, formal verification, risk and hazard analysis, cybersecurity and optimization methods.
Session 1 Ram Evaluation
1(28)
The Effect of Correlated Failure Rates on Reliability of Continuous Time 1-Out-of-2 Software
1(14)
Peter Popov
Gabriele Manno
Model-Driven Availability Evaluation of Railway Control Systems
15(14)
Simona Bernardi
Francesco Flammini
Stefano Marrone
Jose Merseguer
Camilla Papa
Valeria Vittorini
Session 2 Complex Systems Dependability 1
Vertical Safety Interfaces - Improving the Efficiency of Modular Certification
29(14)
Bastian Zimmer
Susanne Burklen
Michael Knoop
Jens Hofflinger
Mario Trapp
DALculus - Theory and Tool for Development Assurance Level Allocation
43(14)
Pierre Bieber
Remi Delmas
Christel Seguin
Towards Cross-Domains Model-Based Safety Process, Methods and Tools for Critical Embedded Systems: The CESAR Approach
57(14)
Jean-Paul Blanquart
Eric Armengaud
Philippe Baufreton
Quentin Bourrouilh
Gerhard Griessnig
Martin Krammer
Odile Laurent
Joseph Machrouh
Thomas Peikenkamp
Cecile Schindler
Tormod Wien
Session 3 Formal Verification 1
From Probabilistic Counterexamples via Causality to Fault Trees
71(14)
Matthias Kuntz
Florian Leitner-Fischer
Stefan Leue
Rigorous Evidence of Freedom from Concurrency Faults in Industrial Control Software
85(14)
Richard Bonichon
Geraud Canet
Loic Correnson
Eric Goubault
Emmanuel Haucourt
Michel Hirschowitz
Sebastien Labbe
Samuel Mimram
Session 4 Risk and Hazard Analysis
Evolutionary Risk Analysis: Expert Judgement
99(14)
Massimo Felici
Valentino Meduri
Bjørnar Solhaug
Alessandra Tedeschi
Computer-Aided PHA, FTA and FMEA for Automotive Embedded Systems
113(15)
Roland Mader
Eric Armengaud
Andrea Leitner
Christian Kreiner
Quentin Bourrouilh
Gerhard Grießnig
Christian Steger
Reinhold Weiß
Session 5 Cybersecurity
A Statistical Anomaly-Based Algorithm for On-line Fault Detection in Complex Software Critical Systems
128(15)
Antonio Bovenzi
Francesco Brancati
Stefano Russo
Andrea Bondavalli
Security Analysis of Smart Grid Data Collection Technologies
143(14)
Luigi Coppolino
Salvatore D'Antonio
Ivano Alessandro Elia
Luigi Romano
Session 6 RAM Evaluation 2
Modeling Aircraft Operational Reliability
157(14)
Kossi Tiassou
Karama Kanoun
Mohamed Kaaniche
Christel Seguin
Chris Papadopoulos
An Integrated Approach for Availability and QoS Evaluation in Railway Systems
171(14)
Antonino Mazzeo
Nicola Mazzocca
Roberto Nardone
Luca D'Acierno
Bruno Montella
Vincenzo Punzo
Egidio Quaglietta
Immacolata Lamberti
Pietro Marmo
Session 7 Case Studies
Using a Software Safety Argument Pattern Catalogue: Two Case Studies
185(14)
Richard Hawkins
Kester Clegg
Rob Alexander
Tim Kelly
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A Dam Case Study
199(14)
Luigi Coppolino
Salvatore D'Antonio
Valerio Formicola
Luigi Romano
A Case Study on State-Based Robustness Testing of an Operating System for the Avionic Domain
213(15)
Domenico Cotroneo
Domenico Di Leo
Roberto Natella
Roberto Pietrantuono
Session 8 Formal Verification 2
Formal Methods for the Certification of Autonomous Unmanned Aircraft Systems
228(15)
Matt Webster
Michael Fisher
Neil Cameron
Mike Jump
Verifying Functional Behaviors of Automotive Products in EAST-ADL2 Using UPPAAL-PORT
243(14)
Eun-Young Kang
Pierre-Yves Schobbens
Paul Pettersson
Poster Session
Establishing Confidence in the Usage of Software Tools in Context of ISO 26262
257(13)
Joachim Hillebrand
Peter Reichenpfader
Irenka Mandic
Hannes Siegl
Christian Peer
Fault-Based Generation of Test Cases from UML-Models - Approach and Some Experiences
270(14)
Rupert Schlick
Wolfgang Herzner
Elisabeth Jobstl
ISO/IEC 15504-10: Motivations for Another Safety Standard
284(12)
Giuseppe Lami
Fabrizio Fabbrini
Mario Fusani
Automatic Synthesis of SRN Models from System Operation Templates for Availability Analysis
296(14)
Kumiko Tadano
Jiangwen Xiang
Masahiro Kawato
Yoshiharu Maeno
A Collaborative Event Processing System for Protection of Critical Infrastructures from Cyber Attacks
310(14)
Leonardo Aniello
Giuseppe A. Di Luna
Giorgia Lodi
Roberto Baldoni
A Fault-Tolerant, Dynamically Scheduled Pipeline Structure for Chip Multiprocessors
324(14)
Hananeh Aliee
Hamid Reza Zarandi
FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment
338(17)
Saman Aliari Zonouz
Kaustubh R. Joshi
William H. Sanders
Reducing Complexity of Data Flow Testing in the Verification of a IEC-62304 Flexible Workflow System
355(14)
Federico Cruciani
Enrico Vicario
Improvement of Processes and Methods in Testing Activities for Safety-Critical Embedded Systems
369(14)
Giuseppe Bonifacio
Pietro Marmo
Antonio Orazzo
Ida Petrone
Luigi Velardi
Alessio Venticinque
Session 9 Formal Verification 3
On the Adoption of Model Checking in Safety-Related Software Industry
383(14)
Alessandro Fantechi
Stefania Gnesi
Equivalence Checking between Function Block Diagrams and C Programs Using HW-CBMC
397(12)
Dong-Ah Lee
Junbeom Yoo
Jang-Soo Lee
A Framework for Simulation and Symbolic State Space Analysis of Non-Markovian Models
409(14)
Laura Carnevali
Lorenzo Ridi
Enrico Vicario
Session 10 Optimization Methods
Model-Based Multi-objective Safety Optimization
423(14)
Matthias Gudemann
Frank Ortmeier
Tradeoff Exploration between Reliability, Power Consumption, and Execution Time
437(15)
Ismail Assayad
Alain Girault
Hamoudi Kalla
Session 11 Complex Systems Dependability 2
Criticality-Driven Component Integration in Complex Software Systems
452(15)
Antonio Pecchia
Roberto Pietrantuono
Stefano Russo
On the Use of Semantic Technologies to Model and Control Security, Privacy and Dependability in Complex Systems
467(14)
Andrea Fiaschetti
Francesco Lavorato
Vincenzo Suraci
Andi Palo
Andrea Taglialatela
Andrea Morgagni
Renato Baldelli
Francesco Flammini
Author Index 481