Computer safety, reliability, and security 29th international conference ; proceedings
- نوع فایل : کتاب
- زبان : انگلیسی
- مؤلف : Erwin Schoitsch; SAFECOMP <29, 2010, Wien>
- ناشر : Berlin Heidelberg New York, NY Springer
- چاپ و سال / کشور: 2010
- شابک / ISBN : 9783642156502
Description
Session 1 System Analysis Reliability Analysis of Safety-Related Communication Architectures . . . . 1 Oliver Schulz and Jan Peleska A Novel HAZOP Study Approach in the RAMS Analysis of a Therapeutic Robot for Disabled Children . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Petr B¨ohm and Thomas Gruber Variability Management of Safety and Reliability Models: An Intermediate Model towards Systematic Reuse of Component Fault Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Carolina G´omez, Peter Liggesmeyer, and Ariane Sutor QoS Analysis of Weighted Multi-state Probabilistic Networks via Decision Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Roberta Terruggia and Andrea Bobbio Session 2 Safety Cases and Certification Comparison between IEC 60880 and IEC 61508 for Certification Purposes in the Nuclear Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Jussi Lahtinen, Mika Johansson, Jukka Ranta, Hannu Harju, and Risto Nevalainen Deriving Safety Cases for Hierarchical Structure in Model-Based Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Nurlida Basir, Ewen Denney, and Bernd Fischer Assurance of Automotive Safety – A Safety Case Approach . . . . . . . . . . . . 82 Robert Palin and Ibrahim Habli How to “Survive” a Safety Case According to ISO 26262 . . . . . . . . . . . . . . 97 Torsten Dittel and Hans-J¨org Aryus X Table of Contents Session 3 Aerospace Benchmarking Software Requirements Documentation for Space Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Paulo C. V´eras, Emilia Villani, Ana Maria Ambr´osio, Rodrigo P. Pontes, Marco Vieira, and Henrique Madeira Verifying Mode Consistency for On-Board Satellite Software . . . . . . . . . . . 126 Alexei Iliasov, Elena Troubitsyna, Linas Laibinis, Alexander Romanovsky, Kimmo Varpaaniemi, Pauli V¨ais¨anen, Dubravka Ilic, and Timo Latvala Computational Concerns in the Integration of Unmanned Airborne Systems into Controlled Airspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Christopher W. Johnson Session 4 Error Detection Residual Error Probability of Embedded CRC by Stochastic Automata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Frank Schiller and Tina Mattes ANB- and ANBDmem-Encoding: Detecting Hardware Errors in Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Ute Schiffel, Andr´e Schmitt, Martin S¨uکkraut, and Christof Fetzer Session 5 Validation and Verification Field Test Methods for a Co-operative Integrated Traffic Management System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Thomas Gruber, Egbert Althammer, and Erwin Schoitsch 100% Coverage for Safety-Critical Software – Efficient Testing by Static Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Daniel K¨astner, Reinhold Heckmann, and Christian Ferdinand MODIFI: A MODel-Implemented Fault Injection Tool . . . . . . . . . . . . . . . . 210 Rickard Svenningsson, Jonny Vinter, Henrik Eriksson, and Martin T¨orngren Table of Contents XI Automated Test Coverage Measurement for Reactor Protection System Software Implemented in Function Block Diagram. . . . . . . . . . . . . . . . . . . . 223 Eunkyoung Jee, Suin Kim, Sungdeok Cha, and Insup Lee Session 6 Testing Overcoming Non-determinism in Testing Smart Devices: A Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Peter Bishop and Lukasz Cyra Software Testing by People with Autism . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Suzanne Haanappel and Sjaak Brinkkemper Session 7 Critical Infrastructure - Smart Grid Information Flow Analysis of Energy Management in a Smart Grid . . . . 263 Ravi Akella and Bruce M. McMillin Integrated Cyber-Physical Fault Injection for Reliability Analysis of the Smart Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 Ayman Faza, Sahra Sedigh, and Bruce McMillin A Metrics for Measuring the Strength of Inter-dependencies . . . . . . . . . . . 291 Silvia Ruzzante, Elisa Castorini, Elena Marchei, and Vincenzo Fioriti Session 8 Security and Safety Security Analysis of Open Building Automation Systems . . . . . . . . . . . . . . 303 Wolfgang Granzer and Wolfgang Kastner A UML Profile for Requirements Analysis of Dependable Software . . . . . 317 Denis Hatebur and Maritta Heisel Session 9 Safety Engineering (1) Model-Based Safety Engineering of Interdependent Functions in Automotive Vehicles Using EAST-ADL2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Anders Sandberg, DeJiu Chen, Henrik L¨onn, Rolf Johansson, Lei Feng, Martin T¨orngren, Sandra Torchiaro, Ramin Tavakoli-Kolagari, and Andreas Abele XII Table of Contents Experiences in Applying Formal Verification in Robotics . . . . . . . . . . . . . . 347 Dennis Walter, Holger T¨aubig, and Christoph L¨uth Evolving a Safe System Design Iteratively . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Alexandre Mota, Joabe Jesus, Adriano Gomes, Felipe Ferri, and Edson Watanabe An Approach to Using Non Safety-Assured Programmable Components in Modest Integrity Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 Peter Bishop, Kostas Tourlas, and Nick Chozos Session 10 Safety Engineering (2) Development of High-Integrity Software Product Lines Using Model Transformation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Stuart Hutchesson and John McDermid On the Safety Implications of E-Governance: Assessing the Hazards of Enterprise Information Architectures in Safety-Critical Applications . . . . 402 Christopher W. Johnson and Stefan Raue The Right Degree of Configurability for Safety-Critical Embedded Software in Variable Message Signs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Thomas Novak and Christoph Stoegerer INDEXYS, a Logical Step beyond GENESYS: INDustrial EXploitation of the genesYS cross-domain architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 Andreas Eckel, Paul Milbredt, Zaid Al-Ars, Stefan Schneele, Bart Vermeulen, Gy¨orgy Csert´an, Christoph Scheerer, Neeraj Suri, Abdelmajid Khelil, Gerhard Fohler, Roman Obermaisser, and Christian Fidi Session 11 System Modelling and Fault Tolerance Integrating System Modelling with Safety Activities . . . . . . . . . . . . . . . . . . 452 Bernhard Kaiser, Vanessa Klaas, Stefan Schulz, Christian Herbst, and Peter Lascych Aspect-Oriented Implementation of Fault Tolerance: An Assessment of Overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 Ruben Alexandersson, Peter ¨Ohman, and Johan Karlsson Table of Contents XIII Invited Talks (Keynote Abstracts) System of Systems Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480 Hermann Kopetz Murphy Was an Optimist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481 Kevin R. Driscoll Process Control Security: Go Dutch! (United, Shared, Lean and Mean) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483 Eric Luiijf Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
A book constitutes the proceedings of the 29th International Conference on Computer Safety, Reliability, and Security that was held in Vienna, Austria in September 2010.