Schoitsch | Safe Comp 96 | E-Book | sack.de
E-Book

E-Book, Englisch, 425 Seiten, eBook

Schoitsch Safe Comp 96

The 15th International Conference on Computer Safety, Reliability and Security, Vienna, Austria October 23–25 1996
Erscheinungsjahr 2012
ISBN: 978-1-4471-0937-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

The 15th International Conference on Computer Safety, Reliability and Security, Vienna, Austria October 23–25 1996

E-Book, Englisch, 425 Seiten, eBook

ISBN: 978-1-4471-0937-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



SAFECOMP '96 contains papers presented at the 15th International Conference on Computer Safety, Reliability and Security held in Vienna, Austria, 23-25 October 1996. The conference aimed to provide an opportunity for technical developers and users to discuss and review their experiences, to consider the best technologies currently available, and to identify the skills and technologies required for the future. SAFECOMP '96 focuses on critical computer applications and is intended as a platform for technology transfer between academia, industry and research institutions. SAFECOMP '96 will be of interest to all those in universities, research institutions, industry and business who want to be well-informed about the current international state of the art in computer safety, reliability and security.
Schoitsch Safe Comp 96 jetzt bestellen!

Zielgruppe


Professional/practitioner


Autoren/Hrsg.


Weitere Infos & Material


Invited Paper.- Systematic Design of Fault-Tolerant Computers.- Session 1: Formal Methods and Models.- Formal Verification of Safety Requirements on Complex Systems.- Formal Specification of Safety-Critical Software with Z and Real-Time CSP.- Safety Analysis Based on Object-oriented Modelling of Critical Systems.- A Processor Architecture Designed to Faciliate the Safety Certification of Hard Real Time Systems.- Session 2: Testing, V&V.- Formal Verification as a Design Tool - The Transponder Lock Example.- Acceptance Criteria for Critical Software Based on Testability Estimates and Test Results.- Developing Dependable Software Using Prototyping and Test-Diversity.- Software Reliability Models and Test Coverage.- Defining the Unit Testing Level of Synchronous Data Flow Programs.- Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them?.- Modeling Software Dependability Growth under Input Partition Testing.- Round Table.- An Holistic Approach to Dependability?.- Invited Paper.- Software-based critical systems.- Session 3: Reliability and Safety Assessment.- Systematic Development of Markov Models for the 1oo2D Programmable Electronic System Architecture - Analysis of Safety and Availability.- Failure Risk Estimation via Markov Software Usage Models.- Design Methodologies and Systems Safety.- Session 4: Industrial Applications and Experience.- Reliability and Vulnerability Assessment as Decision Support during Purchase and Design of Complex, Technical Systems.- Safety Analysis and Evaluation of an Air Traffic Control Computing System.- Creating Markov Models for Applications in the Process Industry.- Session 5: Railway Applications and Experience.- Specifying Railway Interlocking Requirements for Practical Use.- SIGAV, the Italian High Speed Railway Integrated Management System: Safety and Reliability Overview.- A Safe, Reliable Control and Supervisory System for Railway Networks.- Assessment and Certification Requirements in the European Railway Industry.- Session 6: Management and Development.- Failure Classification Schemes for Analysing System Dependability.- Session 7: Human Factors.- Human Factors in High Integrity Software Development: A Field Study.- Human Factors in Safety-Critical Systems: An underestimated contribution?.- PERE: Evaluation and Improvement of Dependable Processes.- Safety and Technology Transfer.- Invited Paper.- Safety Case for the NERC Air Traffic Control System.- Session 8: The Safety Case Legal Aspects.- Integrity Levels and their Application to Road Transport Systems.- Legal Sufficiency of Testing Processes.- Session 9: Security.- Application of Formal Methods in the Scope of IT-Security.- Reliability and Security in Communication Software: PBX Systems and CSTA Applications.- Byzantine Agreement with Limited Authentication.- Implementation of a Security Policy in Distributed Safety Related I&C Systems - A Case Study.- Author Index.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.