+612 9045 4394
 
CHECKOUT
Computer Safety, Reliability and Security : 17th International Conference, Safecomp'98, Heidelberg Germany, October 5-7, 1998, Proceedings - Wolfgang Ehrenberger

Computer Safety, Reliability and Security

17th International Conference, Safecomp'98, Heidelberg Germany, October 5-7, 1998, Proceedings

By: Wolfgang Ehrenberger (Editor)

Paperback Published: 23rd September 1998
ISBN: 9783540651109
Number Of Pages: 404

Share This Book:

Paperback

$146.95
or 4 easy payments of $36.74 with Learn more
Ships in 5 to 9 business days

Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into the information age. In the same way as life of the beginning of this century was dominated by machines, factories, streets and railways, the starting century will be characterised by computers and their networks. This change naturally affects also the institutions and the installations our lives depend upon: power plants, including nuclear ones, chemical plants, mechanically working factories, cars, railways and medical equipment; they all depend on computers and their connections. In some cases it is not human life that may be endangered by computer failure, but large investments; e. g. if a whole plant interrupts its production for a long time. In addition to loss of life and property one must not neglect public opinion, which is very critical in many countries against major technical defects. The related computer technology, its hardware, software and production process differ between standard applications and safety related ones: In the safety case it is normally not only the manufacturers and the customers that are involved, but a third party, usually an assessor, who is taking care of the public interest on behalf of a state authority. Usually safety engineers are in a better position than their colleagues from the conventional side, as they may spend more time and money on a particular task and use better equipment.

Formal Methods I - Analysis and Specification
CoRSA - A Constraint Based Approach to Requirements and Safety Analysisp. 3
An Agenda for Specifying Software Components with Complex Data Modelsp. 16
Safety in Production Cell Components: An Approach Combining Formal Real-Time Specifications and Patternsp. 32
Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systemsp. 45
Linking Hazard Analysis to Formal Specification and Design in Bp. 60
Management and Human Factors
Controlling Your Design through Your Software Processp. 77
Operator Errors and Their Causesp. 89
Security
A Performance Comparison of Group Security Mechanismsp. 103
Towards Secure Downloadable Executable Content: The Java Paradigmp. 117
Model and Implementation of a Secure SW-Development Process for
Mission Critical Softwarep. 128
Impact of Object-Oriented Software Engineering Applied to the Development of
Security Systemsp. 143
Medical Informatics
'Profit by Safety' or Quackery in Biomedical Information Technology?p. 159
Formal Methods II - Languages and Verification
Towards Automated Proof of Fail-safe Behaviourp. 169
Verifying a Time-Triggered Protocol in a Multi-language Environmentp. 185
Methods and Languages for Safety-Related Real-Time Programmingp. 196
ANSI-C in Safety Critical Applications - Lessons-Learned from Software Evaluationp. 209
Applications
A Structured Approach to the Formal Certification of Safety of Computer Aided Development Toolsp. 221
Applying Formal Methods in Industry - The UseGat Projectp. 231
Increasing System Safety for by-wire Applications in Vehicles by Using a Time-Triggered Architecturep. 243
Fault-Tolerant Communication in Large-Scale Manipulatorsp. 254
Distributed Fault-Tolerant and Safety-Critical Application in Vehicles - A Time-Triggered Approachp. 267
Model Checking Safety-Critical Software with SPIN: An Application to a Railway Interlocking Systemp. 284
EURIS, a Specification Method for Distributed Interlockingsp. 296
Object Oriented Safety Analysis of an Extra High Voltage Substation Bayp. 306
Formal Methods III - Petri Nets
Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Netsp. 319
Safety Verification of Software Using Structured Petri Netsp. 329
Reliability
Refinement of Safety-Related Hazards into Verifiable Code Assertionsp. 345
A Conceptual Comparison of Two Commonly Used Safeguarding Principlesp. 359
A Holistic View on the Dependability of Software-Intensive Systemsp. 369
Verifying Integrity of Decision Diagramsp. 380
Author Indexp. 391
Table of Contents provided by Publisher. All Rights Reserved.

ISBN: 9783540651109
ISBN-10: 3540651101
Series: Lecture Notes in Computer Science, : Book 151
Audience: General
Format: Paperback
Language: English
Number Of Pages: 404
Published: 23rd September 1998
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.18
Weight (kg): 0.59