You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Safety-critical systems, in the sense of software-based systems used in safety critical applications, are 'high-tech'. They are products of modern technology. Their effective, efficient and safe functioning depends not only on the devel opment of the right technologies but also on the right use of them. The safety of a system may be compromised not only by faults in the system but also by the use in the first place of an unreliable, unsafe, or unproved technology in its development. The key to the development and use of both technologies and systems is the human being. Until recently, the importance of human involvement, other than at the direct operational level, was hardly admitted. But now the unreliability of humans is recognised, as is the potential for latent faults to be introduced into systems at any point in their life cycles, by all who are in volved with them, including designers and strategic decision makers.
This book constitutes the refereed proceedings of the 26th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2007. The 33 revised full papers and 16 short papers are organized in topical sections on safety cases, impact of security on safety, fault tree analysis, safety analysis, security aspects, verification and validation, platform reliability, reliability evaluation, formal methods, static code analysis, safety-related architectures.
This book constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2012, the 31st International Conference on Computer Safety, Reliability, and Security, held in Magdeburg, Germany, in September 2012. The 49 revised full papers presented were carefully reviewed and selected from numerous submissions. According to the workshops covered, the papers are organized in topical sections on: next generation of system assurance approaches for safety-critical systems (Sassur), architecting safety in collaborative mobile systems (ASCoMS), dependable and secure computing for large-scale complex critical infrastructures (DESEC4LCCI), ERCIM/EWICS/cyberphysical systems (ERCIM/EWICS), and on digital engineering (IWDE).
This book constitutes the refereed proceedings of the 22nd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2003, held in Edinburgh, UK in September 2003. The 30 revised full papers presented together with two keynote talk abstracts were carefully reviewed and selected from 96 submissions. The papers are organized in topical sections on formal methods, design for dependability, security and formal methods, dependability and performance analysis, dependability of medical systems, fault tolerance, tools for dependable design, dependability of critical infrastructures, hazard and safety analysis, and design for dependability.
This book contains the full complement of papers presented at the sixteenth annual Safety-critical Systems Symposium, held at Bristol, UK, in February 2008. The Symposium is for engineers, managers and academics in the field of safety, across all industry sectors, and so the papers included offer a wide-ranging coverage of major safety issues as well as a good blend of academic research and industrial experience. They include discussions of some of the most recent developments.
Probabilistic risk analysis aims to quantify the risk caused by high technology installations. Increasingly, such analyses are being applied to a wider class of systems in which problems such as lack of data, complexity of the systems, uncertainty about consequences, make a classical statistical analysis difficult or impossible. The authors discuss the fundamental notion of uncertainty, its relationship with probability, and the limits to the quantification of uncertainty. Drawing on extensive experience in the theory and applications of risk analysis, the authors focus on the conceptual and mathematical foundations underlying the quantification, interpretation and management of risk. They cover standard topics as well as important new subjects such as the use of expert judgement and uncertainty propagation. The relationship of risk analysis with decision making is highlighted in chapters on influence diagrams and decision theory. Finally, the difficulties of choosing metrics to quantify risk, and current regulatory frameworks are discussed.
A collection of papers presented at the PSAM 7 – ESREL ’04 conference in June 2004, reflecting a wide variety of disciplines, such as principles and theory of reliability and risk analysis, systems modelling and simulation, consequence assessment, human and organisational factors, structural reliability methods, software reliability and safety, insights and lessons from risk studies and management/decision making. This volume covers both well-established practices and open issues in these fields, identifying areas where maturity has been reached and those where more development is needed.
Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish ...
Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into the information age. In the same way as life of the beginning of this century was dominated by machines, factories, streets and railways, the starting century will be characterised by computers and their networks. This change naturally affects also the institutions and the installations our lives depend upon: power plants, including nuclear ones, chemical plants, mechanically working factories, cars, railways and medical equipment; they all depend on computers and their connections. In some cases it is not human life that may be endangered by c...