You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 26th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2007. The 33 revised full papers and 16 short papers are organized in topical sections on safety cases, impact of security on safety, fault tree analysis, safety analysis, security aspects, verification and validation, platform reliability, reliability evaluation, formal methods, static code analysis, safety-related architectures.
This book constitutes the refereed proceedings of the 22nd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2003, held in Edinburgh, UK in September 2003. The 30 revised full papers presented together with two keynote talk abstracts were carefully reviewed and selected from 96 submissions. The papers are organized in topical sections on formal methods, design for dependability, security and formal methods, dependability and performance analysis, dependability of medical systems, fault tolerance, tools for dependable design, dependability of critical infrastructures, hazard and safety analysis, and design for dependability.
This concise, user-oriented and up-to-date desk reference offers a broad introduction to the fascinating world of medical technology, fully considering today’s progress and further development in all relevant fields. The Springer Handbook of Medical Technology is a systemized and well-structured guideline which distinguishes itself through simplification and condensation of complex facts. This book is an indispensable resource for professionals working directly or indirectly with medical systems and appliances every day. It is also meant for graduate and post graduate students in hospital management, medical engineering, and medical physics.
Theimportanceofsafetyandsecurityisgrowingsteadily.Safetyisaqualityc- racteristic that traditionally has been considered to be important in embedded systems, and security is usually an essential property in business applications. There is certainly a tendency to use software-based solutions in safety-critical applications domains, which increases the importance of safety engineering te- niques. These include modelling and analysis techniques as well as appropriate processes and tools. And it is surely correct that the amount of con?dential data that require protection from unauthorized access is growing. Therefore, security is very important. On the one hand, the traditional motivations for a...
In the context of the 18th IFIP World Computer Congress (WCC’04), and beside the traditional organization of conferences, workshops, tutorials and student forum, it was decided to identify a range of topics of dramatic interest for the building of the Information Society. This has been featured as the "Topical day/session" track of the WCC’04. Topical Sessions have been selected in order to present syntheses, latest developments and/or challenges in different business and technical areas. Building the Information Society provides a deep perspective on domains including: the semantic integration of heterogeneous data, virtual realities and new entertainment, fault tolerance for trustworth...
This book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2005, held in Fredrikstad, Norway, in September 2005. The 30 revised full papers were carefully reviewed and selected for inclusion in the book. The papers address all aspects of dependability and survivability of critical computerized systems in various branches and infrastructures.
Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish ...
This book contains the full complement of papers presented at the sixteenth annual Safety-critical Systems Symposium, held at Bristol, UK, in February 2008. The Symposium is for engineers, managers and academics in the field of safety, across all industry sectors, and so the papers included offer a wide-ranging coverage of major safety issues as well as a good blend of academic research and industrial experience. They include discussions of some of the most recent developments.
This book constitutes the refereed proceedings of the 25th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2006. The 32 revised full papers were carefully reviewed and selected from 101 submissions. Topical sections include systems of systems, security and survivability analysis, nuclear safety and application of standards, formal approaches, networks dependability, coping with change and mobility, safety analysis and assessment, 6th FP integrated project DECOS, and modelling.