The Resource Computer Safety, Reliability and Security : 17th International Conference, SAFECOMP'98, Heidelberg Germany, October 5-7, 1998, Proceedings, edited by Wolfgang Ehrenberger, (electronic resource)

Computer Safety, Reliability and Security : 17th International Conference, SAFECOMP'98, Heidelberg Germany, October 5-7, 1998, Proceedings, edited by Wolfgang Ehrenberger, (electronic resource)

Label
Computer Safety, Reliability and Security : 17th International Conference, SAFECOMP'98, Heidelberg Germany, October 5-7, 1998, Proceedings
Title
Computer Safety, Reliability and Security
Title remainder
17th International Conference, SAFECOMP'98, Heidelberg Germany, October 5-7, 1998, Proceedings
Statement of responsibility
edited by Wolfgang Ehrenberger
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
Computers and their interactions are becoming the characteristic features of our time: Many people believe that the industrial age is going over into the information age. In the same way as life of the beginning of this century was dominated by machines, factories, streets and railways, the starting century will be characterised by computers and their networks. This change naturally affects also the institutions and the installations our lives depend upon: power plants, including nuclear ones, chemical plants, mechanically working factories, cars, railways and medical equipment; they all depend on computers and their connections. In some cases it is not human life that may be endangered by computer failure, but large investments; e. g. if a whole plant interrupts its production for a long time. In addition to loss of life and property one must not neglect public opinion, which is very critical in many countries against major technical defects. The related computer technology, its hardware, software and production process differ between standard applications and safety related ones: In the safety case it is normally not only the manufacturers and the customers that are involved, but a third party, usually an assessor, who is taking care of the public interest on behalf of a state authority. Usually safety engineers are in a better position than their colleagues from the conventional side, as they may spend more time and money on a particular task and use better equipment
Member of
Dewey number
005.1
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
1C3P_xoiIcM
Image bit depth
0
Language note
English
LC call number
QA76.9.D335
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
1998
http://bibfra.me/vocab/lite/meetingName
International Conference, SAFECOMP'98
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Ehrenberger, Wolfgang.
Series statement
Lecture Notes in Computer Science,
Series volume
1516
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Computer science
  • Software engineering
  • Coding theory
  • Logic design
  • Cryptology
  • Computers and Society
  • Software Engineering/Programming and Operating Systems
  • Coding and Information Theory
  • Logics and Meanings of Programs
  • Special Purpose and Application-Based Systems
Label
Computer Safety, Reliability and Security : 17th International Conference, SAFECOMP'98, Heidelberg Germany, October 5-7, 1998, Proceedings, edited by Wolfgang Ehrenberger, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references at the end of each chapters and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Formal Methods I - Analysis and Specification -- CoRSA - A Constraint Based Approach to Requirements and Safety Analysis -- An Agenda for Specifying Software Components with Complex Data Models -- Safety in Production Cell Components: An Approach Combining Formal Real Time Specifications and Patterns -- Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systems -- Linking Hazard Analysis to Formal Specification and Design in B -- Management and Human Factors -- Controlling Your Design through Your Software Process -- Operator Errors and Their Causes -- Security -- A Performance Comparison of Group Security Mechanisms -- Towards Secure Downloadable Executable Content: The JAVA Paradigm -- Model and Implementation of a Secure SW-Development Process for Mission Critical Software -- Impact of Object-Oriented Software Engineering Applied to the Development of Security Systems -- Medical Informatics -- “Profit by Safety” or Quackery in Biomedical Information Technology? -- Formal Methods II - Languages and Verification -- Towards Automated Proof of Fail-Safe Behavior -- Verifying a time-triggered protocol in a multi-language environment -- Methods and Languages for Safety Related Real Time Programming -- ANSI-C in Safety Critical Applications Lessons-Learned from Software Evaluation -- Applications -- A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools -- Applying Formal Methods in Industry The UseGat Project -- Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architecture -- Fault-Tolerant Communication in Large-Scale Manipulators -- Distributed Fault Tolerant and Safety Critical Applications in Vehicles - A Time-Triggered Approach -- Model Checking Safety Critical Software with SPIN: an Application to a Railway Interlocking System -- EURIS, a Specification Method for Distributed Interlockings -- Object Oriented Safety Analysis of an Extra High Voltage Substation Bay -- Formal Methods III - Petri Nets -- Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets -- Safety Verification of Software Using Structured Petri Nets -- Reliability -- Refinement of Safety-Related Hazards into Verifiable Code Assertions -- Conceptual Comparison of two Commonly Used Safeguarding Principles -- A Holistic View on the Dependability of Software-Intensive Systems -- Verifying Integrity of Decision Diagrams
Dimensions
unknown
Edition
1st ed. 1998.
Extent
1 online resource (XVI, 404 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540496465
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/3-540-49646-7
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000211015
  • (SSID)ssj0000322115
  • (PQKBManifestationID)11232341
  • (PQKBTitleCode)TC0000322115
  • (PQKBWorkID)10282518
  • (PQKB)11629934
  • (DE-He213)978-3-540-49646-5
  • (MiAaPQ)EBC3072247
  • (EXLCZ)991000000000211015
Label
Computer Safety, Reliability and Security : 17th International Conference, SAFECOMP'98, Heidelberg Germany, October 5-7, 1998, Proceedings, edited by Wolfgang Ehrenberger, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references at the end of each chapters and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Formal Methods I - Analysis and Specification -- CoRSA - A Constraint Based Approach to Requirements and Safety Analysis -- An Agenda for Specifying Software Components with Complex Data Models -- Safety in Production Cell Components: An Approach Combining Formal Real Time Specifications and Patterns -- Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systems -- Linking Hazard Analysis to Formal Specification and Design in B -- Management and Human Factors -- Controlling Your Design through Your Software Process -- Operator Errors and Their Causes -- Security -- A Performance Comparison of Group Security Mechanisms -- Towards Secure Downloadable Executable Content: The JAVA Paradigm -- Model and Implementation of a Secure SW-Development Process for Mission Critical Software -- Impact of Object-Oriented Software Engineering Applied to the Development of Security Systems -- Medical Informatics -- “Profit by Safety” or Quackery in Biomedical Information Technology? -- Formal Methods II - Languages and Verification -- Towards Automated Proof of Fail-Safe Behavior -- Verifying a time-triggered protocol in a multi-language environment -- Methods and Languages for Safety Related Real Time Programming -- ANSI-C in Safety Critical Applications Lessons-Learned from Software Evaluation -- Applications -- A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools -- Applying Formal Methods in Industry The UseGat Project -- Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architecture -- Fault-Tolerant Communication in Large-Scale Manipulators -- Distributed Fault Tolerant and Safety Critical Applications in Vehicles - A Time-Triggered Approach -- Model Checking Safety Critical Software with SPIN: an Application to a Railway Interlocking System -- EURIS, a Specification Method for Distributed Interlockings -- Object Oriented Safety Analysis of an Extra High Voltage Substation Bay -- Formal Methods III - Petri Nets -- Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets -- Safety Verification of Software Using Structured Petri Nets -- Reliability -- Refinement of Safety-Related Hazards into Verifiable Code Assertions -- Conceptual Comparison of two Commonly Used Safeguarding Principles -- A Holistic View on the Dependability of Software-Intensive Systems -- Verifying Integrity of Decision Diagrams
Dimensions
unknown
Edition
1st ed. 1998.
Extent
1 online resource (XVI, 404 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540496465
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/3-540-49646-7
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000211015
  • (SSID)ssj0000322115
  • (PQKBManifestationID)11232341
  • (PQKBTitleCode)TC0000322115
  • (PQKBWorkID)10282518
  • (PQKB)11629934
  • (DE-He213)978-3-540-49646-5
  • (MiAaPQ)EBC3072247
  • (EXLCZ)991000000000211015

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...