Computer Safety, Reliability and Security

17th International Conference, SAFECOMP’98 Heidelberg, Germany, October 5–7, 1998 Proceedings

  • Wolfgang Ehrenberger
Conference proceedings SAFECOMP 1998
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1516)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Formal Methods I - Analysis and Specification

    1. Kirsten Winter, Thomas Santen, Maritta Heisel
      Pages 16-31
    2. Vincent David, Jean Delcoigne, Evelyne Leret, Alain Ourghanlian, Philippe Hilsenkopf, Philippe Paris
      Pages 45-59
    3. K. Lano, P. Kan, A. Sanchez
      Pages 60-74
  3. Management and Human Factors

    1. Nicolás Martín-Vivaldi, Peter Isacsson
      Pages 77-88
    2. Timm Grams
      Pages 89-99
  4. Security

  5. Medical Informatics

    1. Bas A. de Molm, Floor Koornneef
      Pages 159-166
  6. Formal Methods II - Languages and Verification

    1. Peter Liggesmeyer, Martin Rothfelder
      Pages 169-184
    2. Agathe Merceron, Monika Müllerburg, G. Michele Pinna
      Pages 185-195
    3. Wolfgang A. Halang, Alceu Heinke Frigeri
      Pages 196-208
  7. Applications

    1. Piergiorgio Bertoli, Alessandro Cimatti, Fausto Giunchiglia, Paolo Traverso
      Pages 221-230
    2. Sandro Bologna, Rocco Bove, Giovanni Dipoppa, Giorgio Mongardi, Gino Biondi, Carmen Porzia et al.
      Pages 231-242
    3. Th. Ringler, J. Steiner, R. Belschner, B. Hedenetz
      Pages 243-253

About these proceedings

Introduction

Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into the information age. In the same way as life of the beginning of this century was dominated by machines, factories, streets and railways, the starting century will be characterised by computers and their networks. This change naturally affects also the institutions and the installations our lives depend upon: power plants, including nuclear ones, chemical plants, mechanically working factories, cars, railways and medical equipment; they all depend on computers and their connections. In some cases it is not human life that may be endangered by computer failure, but large investments; e. g. if a whole plant interrupts its production for a long time. In addition to loss of life and property one must not neglect public opinion, which is very critical in many countries against major technical defects. The related computer technology, its hardware, software and production process differ between standard applications and safety related ones: In the safety case it is normally not only the manufacturers and the customers that are involved, but a third party, usually an assessor, who is taking care of the public interest on behalf of a state authority. Usually safety engineers are in a better position than their colleagues from the conventional side, as they may spend more time and money on a particular task and use better equipment.

Keywords

Computer Safety, Dependable Computing Formal Methods Reliability Secure Systems formal method medical informatics petri net security verification

Editors and affiliations

  • Wolfgang Ehrenberger
    • 1
  1. 1.Fachbereich Angewandte InformatikFachhochschule FuldaFuldaGermany

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-49646-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 1998
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-65110-9
  • Online ISBN 978-3-540-49646-5
  • Series Print ISSN 0302-9743
  • About this book