Bibliographic Information

Safecomp 96 : the 15th International conference on Computer Safety, Reliability and Security, Vienna, Austria, October 23-25 1996

edited by Erwin Schoitsch ; organized by Austrian Research Centre Seibersdorf ; co-organized by Austrian Federal Ministry of Science, Transport and the Arts ; sponsors, European Workshop on Industrial Computer Systems Technical Committee 7, Federal Research and Testing Centre Arsenal ; co-sponsored by OCG...[et al.]

Springer, c1997

Other Title

SAFECOMP '96

Available at  / 4 libraries

Search this Book/Journal

Note

Includes index

Description and Table of Contents

Description

SAFECOMP '96 contains papers presented at the 15th International Conference on Computer Safety, Reliability and Security held in Vienna, Austria, 23-25 October 1996. The conference aimed to provide an opportunity for technical developers and users to discuss and review their experiences, to consider the best technologies currently available, and to identify the skills and technologies required for the future. SAFECOMP '96 focuses on critical computer applications and is intended as a platform for technology transfer between academia, industry and research institutions. SAFECOMP '96 will be of interest to all those in universities, research institutions, industry and business who want to be well-informed about the current international state of the art in computer safety, reliability and security.

Table of Contents

Invited Paper.- Systematic Design of Fault-Tolerant Computers.- Session 1: Formal Methods and Models.- Formal Verification of Safety Requirements on Complex Systems.- Formal Specification of Safety-Critical Software with Z and Real-Time CSP.- Safety Analysis Based on Object-oriented Modelling of Critical Systems.- A Processor Architecture Designed to Faciliate the Safety Certification of Hard Real Time Systems.- Session 2: Testing, V&V.- Formal Verification as a Design Tool - The Transponder Lock Example.- Acceptance Criteria for Critical Software Based on Testability Estimates and Test Results.- Developing Dependable Software Using Prototyping and Test-Diversity.- Software Reliability Models and Test Coverage.- Defining the Unit Testing Level of Synchronous Data Flow Programs.- Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them?.- Modeling Software Dependability Growth under Input Partition Testing.- Round Table.- An Holistic Approach to Dependability?.- Invited Paper.- Software-based critical systems.- Session 3: Reliability and Safety Assessment.- Systematic Development of Markov Models for the 1oo2D Programmable Electronic System Architecture - Analysis of Safety and Availability.- Failure Risk Estimation via Markov Software Usage Models.- Design Methodologies and Systems Safety.- Session 4: Industrial Applications and Experience.- Reliability and Vulnerability Assessment as Decision Support during Purchase and Design of Complex, Technical Systems.- Safety Analysis and Evaluation of an Air Traffic Control Computing System.- Creating Markov Models for Applications in the Process Industry.- Session 5: Railway Applications and Experience.- Specifying Railway Interlocking Requirements for Practical Use.- SIGAV, the Italian High Speed Railway Integrated Management System: Safety and Reliability Overview.- A Safe, Reliable Control and Supervisory System for Railway Networks.- Assessment and Certification Requirements in the European Railway Industry.- Session 6: Management and Development.- Failure Classification Schemes for Analysing System Dependability.- Session 7: Human Factors.- Human Factors in High Integrity Software Development: A Field Study.- Human Factors in Safety-Critical Systems: An underestimated contribution?.- PERE: Evaluation and Improvement of Dependable Processes.- Safety and Technology Transfer.- Invited Paper.- Safety Case for the NERC Air Traffic Control System.- Session 8: The Safety Case Legal Aspects.- Integrity Levels and their Application to Road Transport Systems.- Legal Sufficiency of Testing Processes.- Session 9: Security.- Application of Formal Methods in the Scope of IT-Security.- Reliability and Security in Communication Software: PBX Systems and CSTA Applications.- Byzantine Agreement with Limited Authentication.- Implementation of a Security Policy in Distributed Safety Related I&C Systems - A Case Study.- Author Index.

by "Nielsen BookData"

Details

Page Top