default search action
25th SAFECOMP 2006: Gdansk, Poland
- Janusz Górski:
Computer Safety, Reliability, and Security, 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006, Proceedings. Lecture Notes in Computer Science 4166, Springer 2006, ISBN 3-540-45762-3
Systems of Systems
- Robert Alexander, Dimitar Kazakov, Tim Kelly:
System of Systems Hazard Analysis Using Simulation and Machine Learning. 1-14 - Igor Nai Fovino, Marcelo Masera:
Through the Description of Attacks: A Multidimensional View. 15-28 - Tomasz Gierszewski, Wojciech Molisz, Jacek Rak:
On Certain Behavior of Scale-Free Networks Under Malicious Attacks. 29-41
Security and Survivability Analysis
- Lassaad Cheikhrouhou, Georg Rock, Werner Stephan, Matthias Schwan, Gunter Lassmann:
Verifying a Chipcard-Based Biometric Identification Protocol in VSE. 42-56 - Felicjan Rydzak, Lars S. Breistrand, Finn Olav Sveen, Ying Qian, Jose J. Gonzalez:
Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry. 57-70 - Eimantas Garsva:
Computer System Survivability Modelling by Using Stochastic Activity Network. 71-84
Nuclear Safety and Application of Standards
- Jang-Soo Lee, Arndt Lindner, Jong-Gyun Choi, Horst Miedl, Kee-Choon Kwon:
Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant. 85-98 - I-Hsin Chou, Chin-Feng Fan:
Regulatory Software Configuration Management System Design. 99-112 - Mário Brito, John May:
Gaining Confidence in the Software Development Process Using Expert Systems. 113-126
Formal Approaches
- Richard Banach, Marco Bozzano:
Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems. 127-141 - Thomas Santen:
Stepwise Development of Secure Systems. 142-155 - Holger Giese, Matthias Tichy:
Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfiguration. 156-169
Networks Dependability
- Wojciech Mazurczyk, Zbigniew Kotulski:
New VoIP Traffic Security Scheme with Digital Watermarking. 170-181 - Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. 182-194 - Byungryong Kim:
Using Group Overlapping to Protect Server from Attack in Grid Computing. 195-204
Coping with Change and Mobility
- Andrzej Wardzinski:
The Role of Situation Awareness in Assuring Safety of Autonomous Vehicles. 205-218 - Mark-Alexander Sujan, Michael D. Harrison, Alison Steven, Pauline H. Pearson, Susan J. Vernon:
Demonstration of Safety in Healthcare Organisations. 219-232 - Won Jay Song, Moon Kyo Cho, Im Sook Há, Mun Kee Choi:
Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks. 233-246
Safety Analysis and Assessment
- Fredrik Törner, Per Johannessen, Peter Öhman:
Assessment of Hazard Identification Methods for the Automotive Domain. 247-260 - Dawid Trawczynski, Janusz Sosnowski, Janusz Zalewski:
A Tool for Databus Safety Analysis Using Fault Injection. 261-274 - Thomas Peikenkamp, Antonella Cavallo, Laura Valacca, Eckard Böde, Matthias Pretzer, Ernst Moritz Hahn:
Towards a Unified Model-Based Safety Assessment. 275-288
Poster Session
- Piotr Cholda, Jerzy Domzal, Andrzej Jajszczyk, Krzysztof Wajda:
Reliability Analysis of Resilient Packet Rings. 289-301 - Meine van der Meulen, Miguel A. Revilla:
Experiences with the Design of a Run-Time Check. 302-315 - Andrzej Bialas:
Development of an Integrated, Risk-Based Platform for Information and E-Services Security. 316-329 - Martin Hall-May, Tim Kelly:
Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems. 330-343 - Marcin Szpyrka, Tomasz Szmuc:
Verification of Automatic Train Protection Systems with RTCP-Nets. 344-357
6th FP Integrated Project DECOS
- Rupert Schlick, Wolfgang Herzner, Thierry Le Sergent:
Checking SCADE Models for Correct Usage of Physical Units. 358-371 - Erwin Schoitsch, Egbert Althammer, Henrik Eriksson, Jonny Vinter, László Gönczy, András Pataricza, György Csertán:
Validation and Certification of Safety-Critical Embedded Systems - The DECOS Test Bench. 372-385 - Martin Schlager, Wolfgang Herzner, Andreas Wolf, Oliver Gründonner, Maximilian Rosenblattl, Erwin Erkinger:
Encapsulating Application Subsystems Using the DECOS Core OS. 386-397
Modelling
- Kirsten Berkenkötter, Ulrich Hannemann:
Modeling the Railway Control Domain Rigorously with a UML 2.0 Profile. 398-411 - Aneta Poniszewska-Maranda:
Access Control Coherence of Information Systems Based on Security Constraints. 412-425 - Norbert Oster, Francesca Saglietti:
Automatic Test Data Generation by Multi-objective Optimisation. 426-438
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.