


default search action
27th SAFECOMP 2008: Newcastle upon Tyne, UK
- Michael D. Harrison, Mark-Alexander Sujan:

Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings. Lecture Notes in Computer Science 5219, Springer 2008, ISBN 978-3-540-87697-7
Keynote Papers
- Erik Hollnagel:

Critical Information Infrastructures: Should Models Represent Structures or Functions? 1-4 - Colin O'Halloran

, Andy Bates:
Security and Interoperability for MANETs and a Fixed Core. 5-11 - Roger Rivett:

Technology, Society and Risk. 12 - Aad P. A. van Moorsel:

Panel: Complexity and Resilience. 13-15
Software Dependability
- Michael Ellims, Darrel C. Ince, Marian Petre:

The Effectiveness of T-Way Test Data Generation. 16-29 - Richard F. Paige, Ramon Charalambous, Xiaocheng Ge

, Phillip J. Brooke:
Towards Agile Engineering of High-Integrity Systems. 30-43 - Christian Denger, Mario Trapp, Peter Liggesmeyer:

SafeSpection - A Systematic Customization Approach for Software Hazard Identification. 44-57 - Dominik Domis, Mario Trapp:

Integrating Safety Analyses and Component-Based Design. 58-71 - De-Jiu Chen

, Rolf Johansson, Henrik Lönn, Yiannis Papadopoulos
, Anders Sandberg, Fredrik Törner, Martin Törngren
:
Modelling Support for Design of Safety-Critical Automotive Embedded Systems. 72-85
Resilience
- Antonio Chialastri, Simone Pozzi:

Resilience in the Aviation System. 86-98 - Jonathan Back, Dominic Furniss

, Michael Hildebrandt, Ann Blandford
:
Resilience Markers for Safer Systems and Organisations. 99-112 - Andrzej Zalewski

, Piotr Sztandera, Marcin Ludzia, Marek Zalewski:
Modeling and Analyzing Disaster Recovery Plans as Business Processes. 113-125
Fault Tolerance
- Tina Mattes, Frank Schiller, Annemarie Mörwald, Thomas Honold:

Analysis of Nested CRC with Additional Net Data in Communication. 126-138 - Michael Glaß

, Martin Lukasiewycz, Felix Reimann, Christian Haubelt
, Jürgen Teich:
Symbolic Reliability Analysis of Self-healing Networked Embedded Systems. 139-152 - Yasser Sedaghat

, Seyed Ghassem Miremadi:
Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers. 153-166
Security
- Liang Xiao, Paul H. Lewis, Srinandan Dasmahapatra

:
Secure Interaction Models for the HealthAgents System. 167-180 - Michael Predeschly, Peter Dadam, Hilmar Acker:

Security Challenges in Adaptive e-Health Processes. 181-192 - Abdullah M. S. Alaraj, Malcolm Munro:

An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. 193-206 - Dennis K. Nilsson, Ulf Larson, Erland Jonsson:

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles. 207-220 - Danielle Chrun, Michel Cukier, Gerry Sneeringer:

Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. 221-234 - Tobias Hoppe, Stefan Kiltz, Jana Dittmann:

Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. 235-248
Safety Cases
- Nurlida Basir, Ewen Denney, Bernd Fischer

:
Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information. 249-262 - Uwe Becker:

Applying Safety Goals to a New Intensive Care Workstation System. 263-276 - Andrzej Wardzinski:

Safety Assurance Strategies for Autonomous Vehicles. 277-290 - Lukasz Cyra, Janusz Górski

:
Expert Assessment of Arguments: A Method and Its Experimental Evaluation. 291-304
Formal Methods
- Xiang Yin, John C. Knight, Elisabeth A. Nguyen, Westley Weimer:

Formal Verification by Reverse Synthesis. 305-319 - Sophie Humbert, Christel Seguin, Charles Castel, Jean-Marc Bosc:

Deriving Safety Software Requirements from an AltaRica System Model. 320-331 - Krzysztof Sacha

:
Model-Based Implementation of Real-Time Systems. 332-345 - Cinzia Bernardeschi

, Paolo Masci
, Holger Pfeifer:
Early Prototyping of Wireless Sensor Network Algorithms in PVS. 346-359
Dependability Modelling
- Dawid Trawczynski, Janusz Sosnowski

, Piotr Gawkowski
:
Analyzing Fault Susceptibility of ABS Microcontroller. 360-372 - Alberto Pasquini, Simone Pozzi, Luca Save:

The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects. 387-400
Security and Dependability
- Jafar Haadi Jafarian, Morteza Amini

, Rasool Jalili:
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. 401-414 - Monika Maidl, David von Oheimb, Peter Hartmann, Richard Robinson:

Formal Security Analysis of Electronic Software Distribution Systems. 415-428 - Ayman Z. Faza

, Sahra Sedigh
, Bruce M. McMillin
:
The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling. 429-439 - Ayman K. Gendy, Michael J. Pont:

Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems. 440-453

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














