標(biāo)題: Titlebook: Computer Safety, Reliability, and Security; 27th International C Michael D. Harrison,Mark-Alexander Sujan Conference proceedings 2008 Sprin [打印本頁(yè)] 作者: invoke 時(shí)間: 2025-3-21 19:46
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學(xué)科排名
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Safety, Reliability, and Security被引頻次
書目名稱Computer Safety, Reliability, and Security被引頻次學(xué)科排名
書目名稱Computer Safety, Reliability, and Security年度引用
書目名稱Computer Safety, Reliability, and Security年度引用學(xué)科排名
書目名稱Computer Safety, Reliability, and Security讀者反饋
書目名稱Computer Safety, Reliability, and Security讀者反饋學(xué)科排名
作者: coddle 時(shí)間: 2025-3-21 23:41
Conclusion: Wrapping Up and Lessons Learned,e problem is broken down into three interdependent research areas of Security versus Risk; Identity Management; Verification, Validation and Certification. The research issues for each area are discussed in detail.作者: 單色 時(shí)間: 2025-3-22 01:19
https://doi.org/10.1007/b109582 that they can be completely specified. The methods emphasize how systems are composed or structured and how component failures propagate. Since socio-technical systems always are underspecified, they cannot be analyzed in the same way. The alternative is to focus on their functions, and how the var作者: 愉快么 時(shí)間: 2025-3-22 05:43 作者: GLIDE 時(shí)間: 2025-3-22 12:44
https://doi.org/10.1007/b109582 from an industry that is a relative newcomer to this discipline I look to the more established industries to give a lead. Not only are they in debate about key issues, the approaches taken do not always transfer easily to a mass market product, developed within very tight business constraints. Key 作者: 痛打 時(shí)間: 2025-3-22 14:29 作者: 痛打 時(shí)間: 2025-3-22 17:03
Conclusion: Wrapping Up and Lessons Learned,l techniques on safety related industrial code using mutation adequacy criteria. A reference point is provided by hand generated test vectors constructed during development to establish minimum acceptance criteria. The study shows that 2-way testing is not adequate measured by mutants kill rate comp作者: cataract 時(shí)間: 2025-3-22 22:13 作者: 系列 時(shí)間: 2025-3-23 03:36 作者: 確保 時(shí)間: 2025-3-23 09:01 作者: SLAG 時(shí)間: 2025-3-23 13:31
https://doi.org/10.1007/b109582tomotive embedded systems. The basis for this is the integration of safety analysis techniques, a method for developing and managing Safety Cases, and a systematic approach to model-based engineering – the EAST-ADL2 architecture description language. Three areas are highlighted: (1) System model dev作者: 散布 時(shí)間: 2025-3-23 17:11
https://doi.org/10.1007/b109582resilience engineering. Our objective is to first outline the structural properties of the aviation domain (i.e. regulations, standards, relationships among the various actors, system dynamics), to then present some example processes that bear an effect on the system resilience. We will in particula作者: Licentious 時(shí)間: 2025-3-23 19:56
Survey of Electricity Models for California, practice of Resilience Engineering has identified that people are still a primary source of resilience, and that the design of distributed systems should provide ways of helping people and organisations to cope with complexity. Although resilience has been identified as a desired property, research作者: handle 時(shí)間: 2025-3-23 23:16 作者: thyroid-hormone 時(shí)間: 2025-3-24 02:33 作者: 新字 時(shí)間: 2025-3-24 07:26
Design Flaws and a Worsening Crisis,rties are used to improve systems characteristics like, e.g., fault-tolerance, reliability, or load-balancing..In this paper, a symbolic reliability analysis of self-healing networked embedded systems that rely on self-reconfiguration and self-routing is presented. The proposed analysis technique re作者: 知識(shí)分子 時(shí)間: 2025-3-24 10:58
Design Flaws and a Worsening Crisis, this paper, the fault sensitivity of the FlexRay communication controller registers are investigated using transient single bit-flip fault injection. To do this, a FlexRay bus network, composed of four nodes, was modeled. A total of 135,600 transient single bit-flip faults were injected to all 408 作者: 異端邪說下 時(shí)間: 2025-3-24 16:03
https://doi.org/10.1007/978-94-017-4414-0t. The sophisticated nature of collaboration among involved partners who contribute services or sensitive data in this paradigm, however, demands careful attention from the beginning of designing such systems. Apart from the traditional need of secure data transmission across clinical centres, a mor作者: fiction 時(shí)間: 2025-3-24 22:06 作者: vasculitis 時(shí)間: 2025-3-25 03:00 作者: 改革運(yùn)動(dòng) 時(shí)間: 2025-3-25 04:12
Terapie delle malattie neurologicherived from a risk assessment for a wireless infrastructure. From the outcome of the risk assessment, a set of security requirements to counter the identified security risks were developed. The security requirements can be viewed as guidelines to support a secure implementation of the wireless infras作者: hematuria 時(shí)間: 2025-3-25 09:35 作者: 任意 時(shí)間: 2025-3-25 13:34
978-3-540-87697-7Springer-Verlag Berlin Heidelberg 2008作者: OMIT 時(shí)間: 2025-3-25 17:50 作者: 極小量 時(shí)間: 2025-3-25 22:09 作者: 上腭 時(shí)間: 2025-3-26 04:12 作者: 存在主義 時(shí)間: 2025-3-26 05:26
Resilience Markers for Safer Systems and Organisations people. Reflection allows systems to better prepare for oncoming demands. We show that contributors to the practice of reflection manifest themselves at different levels of abstraction: from individual strategies to practices in, for example, control room environments. The analysis of interaction a作者: Obstruction 時(shí)間: 2025-3-26 10:27
Modeling and Analyzing Disaster Recovery Plans as Business Processesmulation of BC/DR processes. Timing and dynamic behavior, resource utilization and completeness properties have been also defined. It is possible to analyze them with computer support based on proposed ARIS model of BC/DR plan.作者: 閑逛 時(shí)間: 2025-3-26 13:22
Symbolic Reliability Analysis of Self-healing Networked Embedded Systemslity. Since this analysis is not tailored to a specific online algorithm, it allows a reasonable decision making on the used algorithm by enabling a rating of different self-healing strategies. Experimental results show the effectiveness of the introduced technique even for large networked embedded 作者: 樹上結(jié)蜜糖 時(shí)間: 2025-3-26 20:38
Secure Interaction Models for the HealthAgents Systemhe contextual constraints within interactions that together enforce secure access, the interaction participation being governed by system-wide policies and local resource access being governed by node-wide policies. Clinical security requirements are comprehensively analysed, prior to the design and作者: 過份 時(shí)間: 2025-3-26 22:32
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honestt resolves disputes automatically online by the help of the Trusted Third Party (TTP); and (5) The proposed protocol is efficient in that it has a low number of modular exponentiations (which is the most expensive operations) when compared to other protocols in the literature.作者: arboretum 時(shí)間: 2025-3-27 02:56 作者: Generic-Drug 時(shí)間: 2025-3-27 08:08 作者: Valves 時(shí)間: 2025-3-27 13:11
The California Electricity Crisismulation of BC/DR processes. Timing and dynamic behavior, resource utilization and completeness properties have been also defined. It is possible to analyze them with computer support based on proposed ARIS model of BC/DR plan.作者: 協(xié)迫 時(shí)間: 2025-3-27 15:44 作者: cavity 時(shí)間: 2025-3-27 18:51
https://doi.org/10.1007/978-94-017-4414-0he contextual constraints within interactions that together enforce secure access, the interaction participation being governed by system-wide policies and local resource access being governed by node-wide policies. Clinical security requirements are comprehensively analysed, prior to the design and作者: vitreous-humor 時(shí)間: 2025-3-27 23:56
What is the Legacy of New Labour?t resolves disputes automatically online by the help of the Trusted Third Party (TTP); and (5) The proposed protocol is efficient in that it has a low number of modular exponentiations (which is the most expensive operations) when compared to other protocols in the literature.作者: dowagers-hump 時(shí)間: 2025-3-28 05:44 作者: strain 時(shí)間: 2025-3-28 08:45 作者: semble 時(shí)間: 2025-3-28 13:41 作者: 離開 時(shí)間: 2025-3-28 17:09
Panel: Complexity and ResilienceST) working programme [1], “current state-of-knowledge and state-of-the-art reasonably enable the construction and operation of critical systems, be they safety-critical (e.g., avionics, railway signalling, nuclear control) or availability-critical (e.g., back-end servers for transaction processing)作者: 噴油井 時(shí)間: 2025-3-28 22:39 作者: 倔強(qiáng)一點(diǎn) 時(shí)間: 2025-3-29 02:44 作者: 詢問 時(shí)間: 2025-3-29 04:43
SafeSpection – A Systematic Customization Approach for Software Hazard Identification, software has to be carefully considered in safety analysis efforts to ensure that it does not cause any system hazards. Safety engineering approaches borrowed from systems engineering, like Failure Mode and Effect Analysis, Fault Tree Analysis, or Hazard and Operability Studies, have been applied 作者: osculate 時(shí)間: 2025-3-29 08:52
Integrating Safety Analyses and Component-Based Design demand safety analyses of software architectures and software design. Due to the complexity of software-intensive embedded systems, safety analyses easily become very complex, time consuming, and error prone. To overcome these problems, safety analyses have to be integrated into the complete develo作者: 保全 時(shí)間: 2025-3-29 12:09 作者: Living-Will 時(shí)間: 2025-3-29 18:16 作者: conspicuous 時(shí)間: 2025-3-29 22:00 作者: Scintigraphy 時(shí)間: 2025-3-30 02:11 作者: PATHY 時(shí)間: 2025-3-30 06:56
Analysis of Nested CRC with Additional Net Data in Communicationd in industrial field bus systems where communication is often executed through different layers. Some layers have their own CRC and add their own specific data to the net data that is meant to be sent. Up to now, this nesting is not yet included in the safety proof of systems. Hence, additional eff作者: LIMN 時(shí)間: 2025-3-30 10:22 作者: arabesque 時(shí)間: 2025-3-30 12:28
Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers this paper, the fault sensitivity of the FlexRay communication controller registers are investigated using transient single bit-flip fault injection. To do this, a FlexRay bus network, composed of four nodes, was modeled. A total of 135,600 transient single bit-flip faults were injected to all 408 作者: 露天歷史劇 時(shí)間: 2025-3-30 17:43 作者: landmark 時(shí)間: 2025-3-30 21:41 作者: Semblance 時(shí)間: 2025-3-31 01:33
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honestware) between customer (C) and merchant (M). It makes use of Trusted Third Party (TTP) but its use is kept to minimum when disputes arise. In this respect it is an optimistic fair exchange protocol. A new idea, in which if the parties are willing to exchange then they are encouraged to be honest, is作者: 母豬 時(shí)間: 2025-3-31 08:24
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehiclesrived from a risk assessment for a wireless infrastructure. From the outcome of the risk assessment, a set of security requirements to counter the identified security risks were developed. The security requirements can be viewed as guidelines to support a secure implementation of the wireless infras作者: 對(duì)手 時(shí)間: 2025-3-31 12:35
Design Flaws and a Worsening Crisis,sed on the fault injection results, the TMR and the Hamming code techniques were applied to the most sensitive parts of the FlexRay protocol. These techniques reduced the fault affection to the registers from 26.2% to 10.3% with only 13% hardware overhead.作者: 小畫像 時(shí)間: 2025-3-31 16:08
Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registerssed on the fault injection results, the TMR and the Hamming code techniques were applied to the most sensitive parts of the FlexRay protocol. These techniques reduced the fault affection to the registers from 26.2% to 10.3% with only 13% hardware overhead.作者: SUE 時(shí)間: 2025-3-31 17:52
0302-9743 2008, held in Newcastle upon Tyne, UK, in September 2008. The 32 revised full papers presented together with 3 keynote papers and a panel session were carefully reviewed and selected from 115 submissions. The papers are organized in topical sections on software dependability, resilience, fault toler作者: 煉油廠 時(shí)間: 2025-4-1 01:34 作者: Precursor 時(shí)間: 2025-4-1 05:40 作者: 轉(zhuǎn)折點(diǎn) 時(shí)間: 2025-4-1 08:47
The Con-Lib Agenda for Home Affairs the process instance level. However, e-health scenarios are also very sensitive with regard to privacy issues. Therefore, an adequate access rights management is essential as well. The paper addresses challenges which occur when flexible POIS and adequate rights management have to be put together.作者: 去才蔑視 時(shí)間: 2025-4-1 10:35
Terapie delle malattie neurologichentified security risks were developed. The security requirements can be viewed as guidelines to support a secure implementation of the wireless infrastructure. Moreover, we discuss the importance of defining security policies.作者: Armada 時(shí)間: 2025-4-1 15:20