Computer safety, reliability, and security : 24th international conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005 : proceedings

Computer safety, reliability, and security : 24th international conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005 : proceedings

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • مؤلف : Rune Winther; Bjorn Axel Gran; Gustav Dahll
  • ناشر : Berlin ; New York, NY : Springer, cop
  • چاپ و سال / کشور: 2005
  • شابک / ISBN : 9783540292005
CMMI RAMS Extension Based on CENELEC Railway Standard Jose Antonio Fonseca, Jorge Rady de Almeida J´unior . . . . . . . . . . . . . . 1 The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems Robert Martinez, Torgeir Enkerud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems Nawal Addouche, Christian Antoine, Jacky Montmain . . . . . . . . . . . . . . 24 Defining and Decomposing Safety Policy for Systems of Systems Martin Hall-May, Tim P. Kelly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment George Bearfield, William Marsh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Control and Data Flow Testing on Function Block Diagrams Eunkyoung Jee, Junbeom Yoo, Sungdeok Cha . . . . . . . . . . . . . . . . . . . . . . 67 Comparing Software Measures with Fault Counts Derived from Unit-Testing of Safety-Critical Software Wolfgang Herzner, Stephan Ramberger, Thomas L¨anger, Christian Reumann, Thomas Gruber, Christian Sejkora . . . . . . . . . . . . . 81 Automatic Analysis of a Safety Critical Tele Control System Edoardo Campagnano, Ester Ciancamerla, Michele Minichino, Enrico Tronci . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 A Formal Model for Fault-Tolerance in Distributed Systems Brahim Hamid, Mohamed Mosbah . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Model-Based Safety Analysis of Simulink Models Using SCADE Design Verifier Anjali Joshi, Mats P.E. Heimdahl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Using Safety Critical Artificial Neural Networks in Gas Turbine Aero-Engine Control Zeshan Kurd, Tim P. Kelly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 XII Table of Contents On the Effectiveness of Run-Time Checks Meine J.P. van der Meulen, Lorenzo Strigini, Miguel A. Revilla . . . . . 151 A Technique for Fault Tolerance Assessment of COTS Based Systems Ruben Alexandersson, D. Krishna Chaitanya, Peter ¨ Ohman, Yasir Siraj . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Finding Upper Bounds for Software Failure Probabilities – Experiments and Results Monica Kristiansen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 Justification of Smart Sensors for Nuclear Applications Peter Bishop, Robin Bloomfield, Sofia Guerra, Kostas Tourlas . . . . . . . 194 Evolutionary Safety Analysis: Motivations from the Air Traffic Management Domain Massimo Felici . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Public-Key Cryptography and Availability Tage Stabell-Kulّ, Simone Lupetti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 End-To-End Worst-Case Response Time Analysis for Hard Real-Time Distributed Systems Lei Wang, Mingde Zhao, Zengwei Zheng, Zhaohui Wu . . . . . . . . . . . . . . 233 Safety Interfaces for Component-Based Systems Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea . . . . . . . . . . . . . . 246 A Safety-Related PES for Task-Oriented Real-Time Execution Without Asynchronous Interrupts Martin Skambraks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Are High-Level Languages Suitable for Robust Telecoms Software? J.H. Nystr¨om, P.W. Trinder, D.J. King . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Functional Apportioning of Safety Requirements on Railway Signalling Systems Ola Lّkberg, طystein Skogstad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Automatic Code Generation for PLC Controllers Krzysztof Sacha . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Table of Contents XIII The TACO Approach for Traceability and Communication of Requirements Terje Sivertsen, Rune Fredriksen, Atoosa P-J Thunem, Jan-Erik Holmberg, Janne Valkonen, Olli Vent¨a, Jan-Ove Andersson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 An IEC 62061 Compliant Safety System Design Method for Machinery Bengt Ljungquist, Thomas Thelin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Design Evaluation: Estimating Multiple Critical Performance and Cost Impacts of Designs Tom Gilb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 The Application of an Object-Oriented Method in Information System Security Evaluation Qiang Yan, Hua-ying Shu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 Towards a Cyber Security Reporting System – A Quality Improvement Process Jose J. Gonzalez . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 Security Research from a Multi-disciplinary and Multi-sectoral Perspective Atoosa P-J Thunem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Problem Frames and Architectures for Security Problems Denis Hatebur, Maritta Heisel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .405
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری