Computer Safety, Reliability, and Security

23rd International Conference, SAFECOMP 2004, Potsdam, Germany, September 21-24, 2004. Proceedings

  • Maritta Heisel
  • Peter Liggesmeyer
  • Stefan Wittmann
Conference proceedings SAFECOMP 2004

DOI: 10.1007/b100227

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3219)

Table of contents (27 papers)

  1. Front Matter
  2. Invited Talk

    1. Why Safety and Security Should and Will Merge
      Andreas Pfitzmann
      Pages 1-2
  3. Safety Cases

    1. The Deconstruction of Safety Arguments Through Adversarial Counter-Argument
      James M. Armstrong, Stephen E. Paynter
      Pages 3-16
    2. Using Fuzzy Self-Organising Maps for Safety Critical Systems
      Zeshan Kurd, Tim P. Kelly
      Pages 17-30
    3. Using Formal Methods in a Retrospective Safety Case
      Lars-Henrik Eriksson
      Pages 31-44
  4. Reliability

    1. A Highly Fault Detectable Cache Architecture for Dependable Computing
      Hamid R. Zarandi, Seyed Ghassem Miremadi
      Pages 45-59
    2. An Empirical Exploration of the Difficulty Function
      Julian G. W. Bentley, Peter G. Bishop, Meine van der Meulen
      Pages 60-71
  5. Human Factors

  6. Invited Talk

  7. Transportation

    1. A Hybrid Testing Methodology for Railway Control Systems
      Giuseppe De Nicola, Pasquale di Tommaso, Rosaria Esposito, Francesco Flammini, Antonio Orazzo
      Pages 116-129
    2. Actuator Based Hazard Analysis for Safety Critical Systems
      Per Johannessen, Fredrik Törner, Jan Torin
      Pages 130-141
    3. Performability Measures of the Public Mobile Network of a Tele Control System
      Ester Ciancamerla, Michele Minichino
      Pages 142-154
  8. Software Development

    1. PLC-Based Safety Critical Software Development for Nuclear Power Plants
      Junbeom Yoo, Sungdeok Cha, Han Seong Son, Chang Hwoi Kim, Jang-Soo Lee
      Pages 155-165
    2. Compositional Hazard Analysis of UML Component and Deployment Models
      Holger Giese, Matthias Tichy, Daniela Schilling
      Pages 166-179
    3. Automatic Test Data Generation from Embedded C Code
      Eileen Dillon, Christophe Meudec
      Pages 180-194
  9. Fault Tree Analysis

    1. Safety Requirements and Fault Trees Using Retrenchment
      R. Banach, R. Cross
      Pages 210-223
    2. The Effects on Reliability of Integration of Aircraft Systems Based on Integrated Modular Avionics
      Dominick Rehage, Udo B. Carl, Maximilian Merkel, Andreas Vahl
      Pages 224-238

About these proceedings


Theimportanceofsafetyandsecurityisgrowingsteadily.Safetyisaqualityc- racteristic that traditionally has been considered to be important in embedded systems, and security is usually an essential property in business applications. There is certainly a tendency to use software-based solutions in safety-critical applications domains, which increases the importance of safety engineering te- niques. These include modelling and analysis techniques as well as appropriate processes and tools. And it is surely correct that the amount of con?dential data that require protection from unauthorized access is growing. Therefore, security is very important. On the one hand, the traditional motivations for addressing safety and security still exist, and their relevance has improved. On the other hand, safety and security requirements occur increasingly in the same system. At present, many software-based systems interact with technical equipment and they communicate, e.g., with users and other systems. Future systems will more and more interact with many other entities (technical systems, people, the en- ronment). In this situation, security problems may cause safety-related failures. It is thus necessary to address safety and security. It is furthermore required to take into account the interactions between these two properties.


Code IT security QoS Unified Modeling Language (UML) architecture computer reliability computer safety computer security correct systems behaviour dependable computing modeling reaction systems safety-critical systems security systems security

Editors and affiliations

  • Maritta Heisel
    • 1
  • Peter Liggesmeyer
    • 2
  • Stefan Wittmann
    • 3
  1. 1.Faculty of Engineering, Department of Computer Science and Cognitive Science, Workgroup Software EngineeringUniversity Duisburg-EssenGermany
  2. 2.Fraunhofer Institute Experimental Software EngineeringKaiserslauternGermany
  3. 3.Bundesamt fuer Sicherheit in der InformationstechnikBonnGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-23176-9
  • Online ISBN 978-3-540-30138-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349