Computer Safety, Reliability, and Security: 25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Welcome to SAFECOMP 2006, the 25th International Conference on Computer Safety, Security and Reliability, held in Gdansk,Poland. Since it was established in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP has continuously contributed to the progress in high integrity applications of information technologies. The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability of critical IT systems and applications and serves as a platform for knowledge and technology transfer for researchers, industry (suppliers, operators, users), regulators and certi?ers of such systems. SAFECOMP provides ample opportunity to exchange insights and experiences on emerging methods, approaches and practical so- tions to safety, security and reliability problems across the borders of di?erent application domains and technologies. The SAFECOMP 2006 program re?ected in this book included 32 papers selected from 101 submissions of full texts. The submissions came from authors representing 26 di?erent countries from Europe, Asia, and North and South America. The 32 accepted papers were prepared by experts representing 14 d- ferent countries. The above data con?rm the broad and increasing interest in SAFECOMP and the topics addressed. The program was supplemented by three keynote presentations by outsta- ing invited experts (not included in this book). The keynotes focused on - terdisciplinary aspects of dependability of computer systems, practical aspects of application of safety standards and new challenges of information security research and development.

Author(s): Robert Alexander, Dimitar Kazakov, Tim Kelly (auth.), Janusz Górski (eds.)
Series: Lecture Notes in Computer Science 4166
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 442
Tags: Software Engineering/Programming and Operating Systems; Coding and Information Theory; Special Purpose and Application-Based Systems; Logics and Meanings of Programs; Management of Computing and Information Systems

Front Matter....Pages -
System of Systems Hazard Analysis Using Simulation and Machine Learning....Pages 1-14
Through the Description of Attacks: A Multidimensional View....Pages 15-28
On Certain Behavior of Scale-Free Networks Under Malicious Attacks....Pages 29-41
Verifying a Chipcard-Based Biometric Identification Protocol in VSE....Pages 42-56
Exploring Resilience Towards Risks in eOperations in the Oil and Gas Industry....Pages 57-70
Computer System Survivability Modelling by Using Stochastic Activity Network....Pages 71-84
Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant....Pages 85-98
Regulatory Software Configuration Management System Design....Pages 99-112
Gaining Confidence in the Software Development Process Using Expert Systems....Pages 113-126
Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic Systems....Pages 127-141
Stepwise Development of Secure Systems....Pages 142-155
Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-Reconfiguration....Pages 156-169
New VoIP Traffic Security Scheme with Digital Watermarking....Pages 170-181
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies....Pages 182-194
Using Group Overlapping to Protect Server from Attack in Grid Computing....Pages 195-204
The Role of Situation Awareness in Assuring Safety of Autonomous Vehicles....Pages 205-218
Demonstration of Safety in Healthcare Organisations....Pages 219-232
Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor Networks....Pages 233-246
Assessment of Hazard Identification Methods for the Automotive Domain....Pages 247-260
A Tool for Databus Safety Analysis Using Fault Injection....Pages 261-274
Towards a Unified Model-Based Safety Assessment....Pages 275-288
Reliability Analysis of Resilient Packet Rings....Pages 289-301
Experiences with the Design of a Run-Time Check....Pages 302-315
Development of an Integrated, Risk-Based Platform for Information and E-Services Security....Pages 316-329
Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of Systems....Pages 330-343
Verification of Automatic Train Protection Systems with RTCP-Nets....Pages 344-357
Checking SCADE Models for Correct Usage of Physical Units....Pages 358-371
Validation and Certification of Safety-Critical Embedded Systems – The DECOS Test Bench....Pages 372-385
Encapsulating Application Subsystems Using the DECOS Core OS....Pages 386-397
Modeling the Railway Control Domain Rigorously with a UML 2.0 Profile....Pages 398-411
Access Control Coherence of Information Systems Based on Security Constraints....Pages 412-425
Automatic Test Data Generation by Multi-objective Optimisation....Pages 426-438
Back Matter....Pages -