Theimportanceofsafetyandsecurityisgrowingsteadily.Safetyisaqualityc- racteristic that traditionally has been considered to be important in embedded systems, and security is usually an essential property in business applications. There is certainly a tendency to use software-based solutions in safety-critical applications domains, which increases the importance of safety engineering te- niques. These include modelling and analysis techniques as well as appropriate processes and tools. And it is surely correct that the amount of con?dential data that require protection from unauthorized access is growing. Therefore, security is very important. On the one hand, the traditional motivations for addressing safety and security still exist, and their relevance has improved. On the other hand, safety and security requirements occur increasingly in the same system. At present, many software-based systems interact with technical equipment and they communicate, e.g., with users and other systems. Future systems will more and more interact with many other entities (technical systems, people, the en- ronment). In this situation, security problems may cause safety-related failures. It is thus necessary to address safety and security. It is furthermore required to take into account the interactions between these two properties.
Author(s): Andreas Pfitzmann (auth.), Maritta Heisel, Peter Liggesmeyer, Stefan Wittmann (eds.)
Series: Lecture Notes in Computer Science 3219
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004
Language: English
Pages: 344
Tags: Software Engineering/Programming and Operating Systems; Coding and Information Theory; Special Purpose and Application-Based Systems; Logics and Meanings of Programs; Management of Computing and Information Systems
Front Matter....Pages -
Why Safety and Security Should and Will Merge....Pages 1-2
The Deconstruction of Safety Arguments Through Adversarial Counter-Argument....Pages 3-16
Using Fuzzy Self-Organising Maps for Safety Critical Systems....Pages 17-30
Using Formal Methods in a Retrospective Safety Case....Pages 31-44
A Highly Fault Detectable Cache Architecture for Dependable Computing....Pages 45-59
An Empirical Exploration of the Difficulty Function....Pages 60-71
Towards the Integration of Fault, Resource, and Power Management....Pages 72-86
Modeling Concepts for Safety-Related Requirements in Sociotechnical Systems....Pages 87-100
Analysing Mode Confusion: An Approach Using FDR2....Pages 101-114
Handling Safety Critical Requirements in System Engineering Using the B Formal Method....Pages 115-115
A Hybrid Testing Methodology for Railway Control Systems....Pages 116-129
Actuator Based Hazard Analysis for Safety Critical Systems....Pages 130-141
Performability Measures of the Public Mobile Network of a Tele Control System....Pages 142-154
PLC-Based Safety Critical Software Development for Nuclear Power Plants....Pages 155-165
Compositional Hazard Analysis of UML Component and Deployment Models....Pages 166-179
Automatic Test Data Generation from Embedded C Code....Pages 180-194
State-Event-Fault-Trees – A Safety Analysis Model for Software Controlled Systems....Pages 195-209
Safety Requirements and Fault Trees Using Retrenchment....Pages 210-223
The Effects on Reliability of Integration of Aircraft Systems Based on Integrated Modular Avionics....Pages 224-238
Automotive Telematics – Road Safety Versus IT Security?....Pages 239-239
Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture....Pages 240-253
Refinement of Fault Tolerant Control Systems in B....Pages 254-268
Numerical Integration of PDEs for Safety Critical Applications Implemented by I&C Systems....Pages 269-282
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth....Pages 283-296
Dependability Benchmarking of Web-Servers....Pages 297-310
An Approach for Model-Based Risk Assessment....Pages 311-324
How Explicit Are the Barriers to Failure in Safety Arguments?....Pages 325-337
Back Matter....Pages -