Computer Safety, Reliability, and Security

26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007. Proceedings

  • Editors
  • Francesca Saglietti
  • Norbert Oster
Conference proceedings SAFECOMP 2007

DOI: 10.1007/978-3-540-75101-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4680)

Table of contents (49 papers)

  1. Front Matter
  2. Safety Cases

    1. Establishing Evidence for Safety Cases in Automotive Systems – A Case Study
      Willem Ridderhof, Hans-Gerhard Gross, Heiko Doerr
      Pages 1-13
    2. Goal-Based Safety Cases for Medical Devices: Opportunities and Challenges
      Mark-Alexander Sujan, Floor Koornneef, Udo Voges
      Pages 14-27
  3. Impact of Security on Safety

    1. Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety
      Richard Robinson, Mingyan Li, Scott Lintelman, Krishna Sampigethaya, Radha Poovendran, David von Oheimb et al.
      Pages 28-39
    2. Future Perspectives: The Car and Its IP-Address – A Potential Safety and Security Risk Assessment
      Andreas Lang, Jana Dittmann, Stefan Kiltz, Tobias Hoppe
      Pages 40-53
    3. Modelling Interdependencies Between the Electricity and Information Infrastructures
      Jean-Claude Laprie, Karama Kanoun, Mohamed Kaâniche
      Pages 54-67
  4. Poster Session 1

    1. Handling Malicious Code on Control Systems
      Wan-Hui Tseng, Chin-Feng Fan
      Pages 68-74
    2. RAMSS Analysis for a Co-operative Integrated Traffic Management System
      Armin Selhofer, Thomas Gruber, Michael Putz, Erwin Schoitsch, Gerald Sonneck
      Pages 87-92
    3. Combining Static/Dynamic Fault Trees and Event Trees Using Bayesian Networks
      S. M. Hadi Hosseini, Makoto Takahashi
      Pages 93-99
    4. Fault Tree Analysis

      1. Compositional Temporal Fault Tree Analysis
        Martin Walker, Leonardo Bottaci, Yiannis Papadopoulos
        Pages 106-119
      2. Representing Parameterised Fault Trees Using Bayesian Networks
        William Marsh, George Bearfield
        Pages 120-133
    5. Safety Analysis

    6. Security Aspects

      1. Survival by Deception
        Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Jan Tore Sørensen
        Pages 197-208

About these proceedings

Introduction

Since 1979, when it was ?rst established by the Technical Committee on Re- ability, Safety and Security of the European Workshop on Industrial Computer Systems (EWICS TC7), the SAFECOMP Conference series has regularly and continuously contributed to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied to safety-relevant industrial domains. Inthisexpandingtechnical?eldSAFECOMPo?ersaplatformforknowledge andtechnologytransferbetweenacademia,industry,researchandlicensingins- tutions, providing ample opportunities for exchanging insights, experiences and trends in the areas of safety, reliability and security regarding critical computer applications. In accordance with the growing spread of critical infrastructures involving both safety and security threats, this year’s SAFECOMP program included a considerable number of contributions addressing technical problems and engineering solutions across the border between safety-related and securi- related concerns. Thereactiontoourcallforpaperswasparticularlygratifyingandimpressive, including 136 full papers submitted by authors representing 29 countries from Europe,Asia, North and South America aswell asAustralia. The selection of 33 fullpapersand16shortpapersforpresentationandpublicationwasachallenging task requiring a huge amount of reviewing and organizational e?ort. In view of the particularly high number of articles submitted, obvious practical constraints led – to our regret – to the rejection of a considerable amount of high-quality work. To all authors, invited speakers, members of the International Program Committee and external reviewers go our heartfelt thanks! The local organization of SAFECOMP 2007, hosted in Nuremberg, is also gratefully acknowledged.

Keywords

Processing Unified Modeling Language (UML) access control cognitive systems communication computer reliability computer security configuration correct systems behaviour data integrity dependability dynamic systems formal method operating system security

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-75100-7
  • Online ISBN 978-3-540-75101-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349