You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Theimportanceofsafetyandsecurityisgrowingsteadily.Safetyisaqualityc- racteristic that traditionally has been considered to be important in embedded systems, and security is usually an essential property in business applications. There is certainly a tendency to use software-based solutions in safety-critical applications domains, which increases the importance of safety engineering te- niques. These include modelling and analysis techniques as well as appropriate processes and tools. And it is surely correct that the amount of con?dential data that require protection from unauthorized access is growing. Therefore, security is very important. On the one hand, the traditional motivations for a...
This year we celebrated another anniversary: after 20 years of SAFECOMP in 1999, th this was the 20 SAFECOMP since its inauguration in 1979. This series of events focuses on critical computer applications. It is intended to be a platform for knowledge transfer between academia, industry, and research institutions. Papers are solicited on all aspects of computer systems in which safety, reliability, and security (applied to safety in terms of integrity and availability) are of importance. The 20th SAFECOMP tried to cover new grounds, both thematically and geographically. The previous 19 SAFECOMPs were held in Austria (1989, 1996), France (1987, 1999), Germany (1979, 1988, 1998), Great Britain...
This volume contains the contributions presented at the International Workshop on Current Trends in Applied Formal Methods organized October 7-9, 1998, in Boppard, Germany. The main objective of the workshop was to draw a map of the key issues facing the practical application of formal methods in industry. This appears to be particularly timely with safety and security issues becoming a real obstacle to industrial software and hardware development. As a consequence, almost all major companies have now set up departments or groups to work with formal methods and many European countries face a severe labour shortage in this new field. Tony Hoare's prediction of the art of software (and hardwar...
This book constitutes the refereed proceedings of the 26th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2007. The 33 revised full papers and 16 short papers are organized in topical sections on safety cases, impact of security on safety, fault tree analysis, safety analysis, security aspects, verification and validation, platform reliability, reliability evaluation, formal methods, static code analysis, safety-related architectures.
This book constitutes the refereed proceedings of the 21st International Conference on Computer Safety, Reliability and Security, SAFECOMP 2002, held in Catania, Italy in September 2002. The 27 revised papers presented together with 3 keynote presentations were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections on human-computer system dependability, human factors, security, dependability assessment, application of formal methods, reliability assessment, design for dependability, and safety assessment.
Distribution logistics have been strongly affected by recent economic trends: globalization of markets, deregulation of the European freight traffic, a growing part of just-in-time deliveries and both increased competition and strategic cooperation between all parties involved. The book covers in a systematic way the strategic, tactical and operational planning of distribution systems and processes. It gives an overview of the relevant quantitative models and techniques as well as of applications in industry presented through numerous case studies. Researchers and practitioners will thus equally benefit from this volume.
This book gives a comprehensive view of the most recent major international research in the field of tolerancing, and is an excellent resource for anyone interested in Computer Aided Tolerating. It is organized into 4 parts. Part 1 focuses on the more general problems of tolerance analysis and synthesis, for tolerancing in mechanical design and manufacturing processes. Part 2 specifically highlights the simulation of assembly with defects, and the influence of tolerances on the quality of the assembly. Part 3 deals with measurement aspects, and quality control throughout the life cycle. Different measurement technologies and methods for estimating uncertainty are considered. In Part 4, different aspects of tolerancing and their interactions are explored, from the definition of functional requirement to measurement processes in a PLM approach.
There are more and more automated systems with which people are led to interact everyday. Their complexity increases, and badly designed systems may result in automation surprises. The contribution of this thesis is a formal analysis framework to assess whether a system is prone to potential automation surprises in an interaction.
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, eID Cards, Infrastructure Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE/SECURE 2007.
This book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2005, held in Fredrikstad, Norway, in September 2005. The 30 revised full papers were carefully reviewed and selected for inclusion in the book. The papers address all aspects of dependability and survivability of critical computerized systems in various branches and infrastructures.