標題: Titlebook: Computer Safety, Reliability and Security; 21st International C Stuart Anderson,Massimo Felici,Sandro Bologna Conference proceedings 2002 S [打印本頁] 作者: Entangle 時間: 2025-3-21 18:58
書目名稱Computer Safety, Reliability and Security影響因子(影響力)
書目名稱Computer Safety, Reliability and Security影響因子(影響力)學科排名
書目名稱Computer Safety, Reliability and Security網(wǎng)絡公開度
書目名稱Computer Safety, Reliability and Security網(wǎng)絡公開度學科排名
書目名稱Computer Safety, Reliability and Security被引頻次
書目名稱Computer Safety, Reliability and Security被引頻次學科排名
書目名稱Computer Safety, Reliability and Security年度引用
書目名稱Computer Safety, Reliability and Security年度引用學科排名
書目名稱Computer Safety, Reliability and Security讀者反饋
書目名稱Computer Safety, Reliability and Security讀者反饋學科排名
作者: 入會 時間: 2025-3-21 23:14
The Automotive Development Process,ole is needed instead. The dependability of human-computer systems must therefore refer to the performance characteristics of the joint system, and specifically the variability of human performance, not just as stochastic variations but also as purposeful local optimisation.作者: 極深 時間: 2025-3-22 02:36 作者: outer-ear 時間: 2025-3-22 07:03
https://doi.org/10.1007/BFb0039443 analysis, semiformal methods for object-oriented modelling, and computerised tools, for a precise, unambiguous, and efficient risk assessment of security critical systems. This paper presents the CORAS framework and the related conclusions from the CORAS project so far.作者: 幸福愉悅感 時間: 2025-3-22 10:21 作者: bizarre 時間: 2025-3-22 13:24
Elementary transformation matrices,ed to the verification of TLS, the Internet Standard Protocol that IETF derived from the SSL 3.0 of Netscape. The results of our analysis show that the protocol satisfies all the security requirements for which it was designed.作者: bizarre 時間: 2025-3-22 19:32
Elementary transformation matrices,mplementation of the fault injection technique to evaluate redundant systems under various conditions. A protection system is used as an example to illustrate the evaluation of software structural diversity, optimal selection of channel- pairs and the assessment of different designs.作者: 出處 時間: 2025-3-22 21:17
https://doi.org/10.1007/BFb0039443 theory. The theory is used to justify the use of linear extrapolation to estimate residual faults. It is also shown that it is important to establish the amount of unreachable code in order to make a realistic residual fault estimate.作者: 顯微鏡 時間: 2025-3-23 04:28
Dependability of Joint Human-Computer Systemsole is needed instead. The dependability of human-computer systems must therefore refer to the performance characteristics of the joint system, and specifically the variability of human performance, not just as stochastic variations but also as purposeful local optimisation.作者: 陳列 時間: 2025-3-23 06:49
Dependability as Ordinary Action. We show how attending to the logical grammar of dependability can clarify some issues and potential conceptual confusions around the term that occur between lay and ‘professional’ uses. The paper ends with a call to consider dependability in its everyday ordinary language context as well as more ‘professional’ uses of this term.作者: 主動 時間: 2025-3-23 13:38
The CORAS Framework for a Model-Based Risk Management Process analysis, semiformal methods for object-oriented modelling, and computerised tools, for a precise, unambiguous, and efficient risk assessment of security critical systems. This paper presents the CORAS framework and the related conclusions from the CORAS project so far.作者: 任意 時間: 2025-3-23 15:00
Software Challenges in Aviation Systemsms are developed. Several new concepts are being developed specifically to address current safety issues in aviation such as runway incursions. This paper summarizes some of the system issues and the resulting challenges to the safety and software engineering research communities.作者: relieve 時間: 2025-3-23 19:19 作者: CERE 時間: 2025-3-23 23:30
Assessment of the Benefit of Redundant Systemsmplementation of the fault injection technique to evaluate redundant systems under various conditions. A protection system is used as an example to illustrate the evaluation of software structural diversity, optimal selection of channel- pairs and the assessment of different designs.作者: 階層 時間: 2025-3-24 06:01
Estimating Residual Faults from Code Coverage theory. The theory is used to justify the use of linear extrapolation to estimate residual faults. It is also shown that it is important to establish the amount of unreachable code in order to make a realistic residual fault estimate.作者: 文藝 時間: 2025-3-24 09:05 作者: Rankle 時間: 2025-3-24 13:43
https://doi.org/10.1007/BFb0039443ments. This paper addresses the development approach of MB-V2M2, an outline of the model, early validation experiments, current status and future outlook. The resulting model is dubbed MB- V2M2 (Metrics Based Verification&Validation Maturity Model).作者: DEBT 時間: 2025-3-24 16:28 作者: Antimicrobial 時間: 2025-3-24 21:58 作者: 搖擺 時間: 2025-3-25 01:24 作者: 華而不實 時間: 2025-3-25 03:29 作者: NAIVE 時間: 2025-3-25 07:55
Conference proceedings 20029 submissions. The papers are organized in topical sections on human-computer system dependability, human factors, security, dependability assessment, application of formal methods, reliability assessment, design for dependability, and safety assessment.作者: aerial 時間: 2025-3-25 13:31
The Automotive Development Processely ignore the communication context. We propose example to provide key recovery capability by adding key recovery information to an IP datagram. It is possible to take advantage of the communication environment in order to design key recovery protocols that are better suited and more efficient.作者: 謊言 時間: 2025-3-25 16:03 作者: Orthodontics 時間: 2025-3-25 21:40
The Automotive Development Process, cause, leading to a number of design recommendations for shared-control systems which help to avoid mode confusion problems. A further result is a foundation for detecting mode confusion problems by model checking.作者: 離開真充足 時間: 2025-3-26 03:00 作者: chondromalacia 時間: 2025-3-26 04:48
Elementary transformation matrices,ence under simplifying assumptions. Here we study the effect of these on the accuracy of predictions and discuss the problems, some of them open for future research, of using Bayesian inference for practical reliability assessment.作者: 憎惡 時間: 2025-3-26 12:27
A Rigorous View of Mode Confusion cause, leading to a number of design recommendations for shared-control systems which help to avoid mode confusion problems. A further result is a foundation for detecting mode confusion problems by model checking.作者: 乞丐 時間: 2025-3-26 12:46 作者: 典型 時間: 2025-3-26 18:24
Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Componentsence under simplifying assumptions. Here we study the effect of these on the accuracy of predictions and discuss the problems, some of them open for future research, of using Bayesian inference for practical reliability assessment.作者: Affection 時間: 2025-3-26 23:06 作者: 莎草 時間: 2025-3-27 02:04 作者: 學術討論會 時間: 2025-3-27 08:17
Statistical Comparison of Two Sum-of-Disjoint-Product Algorithms for Reliability and Safety Evaluatismaller number of disjoint products as confirmed by some examples. This paper quantifies this advantage by statistical methods and statistical characteristics for both algorithms presenting measurements of the number of produced disjoint products and the computation time of both algorithms for a lar作者: certitude 時間: 2025-3-27 11:25 作者: 花束 時間: 2025-3-27 14:04 作者: Critical 時間: 2025-3-27 18:29
Human-Computer System Dependabilitypendability specialists and, especially, end- users. The objective of the session is to provide a forum for the sharing of practical experiences and research results related to safety and dependability of human-computer systems.作者: insidious 時間: 2025-3-27 22:56
Dependability of Joint Human-Computer Systemsral contemporary schools of thought point out that decomposed descriptions are insufficient, and that a description on the level of the system as a whole is needed instead. The dependability of human-computer systems must therefore refer to the performance characteristics of the joint system, and sp作者: 財產 時間: 2025-3-28 03:19 作者: FEMUR 時間: 2025-3-28 08:46 作者: cancer 時間: 2025-3-28 12:36 作者: Constrain 時間: 2025-3-28 15:14
Practical Solutions to Key Recovery Based on PKI in IP Securityvery has been the subject of a lot of discussion, of much controversy and of extensive research. Key recovery, however, might be needed at a corporate level, as a form of key management. The basic observation of the present paper is that cryptographic solutions that have been proposed so far complet作者: 有幫助 時間: 2025-3-28 22:30
Redundant Data Acquisition in a Distributed Security Compoundredundant data acquisition to get the complete net-wide network traffic for later analysis. The compound itself has a distributed structure. Different components act together on different hosts in the security compound. Therefore, the acquisition and analysis are done net-wide by hosts with free res作者: 售穴 時間: 2025-3-29 02:56
Survivability Strategy for a Security Critical Processof integrity, authenticity and confidentiality of data processing. It’s a matter of fact that high-level security may only be achieved through adequate physical protection. The classical approach is to close away such processes in computing centers protected by physical barriers with high drag facto作者: Motilin 時間: 2025-3-29 04:16
Statistical Comparison of Two Sum-of-Disjoint-Product Algorithms for Reliability and Safety Evaluatiems. Especially the probability that a systems operates (safely) using the probabilities that its components operate is a vital system characteristic and its computation is a nontrivial task. The most often used method to solve this problem is to derive disjoint events from the description of the sy作者: 偉大 時間: 2025-3-29 08:17 作者: 猛擊 時間: 2025-3-29 14:11 作者: 谷類 時間: 2025-3-29 17:37 作者: 種族被根除 時間: 2025-3-29 22:37
Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Componentsriginal design of such systems are either not available off-the-shelf (OTS) or have become extremely expensive as a result of being discontinued as mass production components. Maintaining a legacy system, therefore, demands using different OTS components. Trustworthy reliability assurance after an u作者: custody 時間: 2025-3-30 02:51
Assessment of the Benefit of Redundant Systems simulation has been proposed as a practical method to estimate diversity of multi-version software. This paper applies data-flow perturbation as an implementation of the fault injection technique to evaluate redundant systems under various conditions. A protection system is used as an example to il作者: 標準 時間: 2025-3-30 04:25 作者: Noctambulant 時間: 2025-3-30 10:47
Towards a Metrics Based Verification and Validation Maturity Modelnd validation is only marginally addressed in software process improvement models like CMMI, a separate verification and validation improvement model has been developed. The framework of the improvement model presented in this paper is based on the “Testing Maturity Model (TMM). However considerable作者: 懶鬼才會衰弱 時間: 2025-3-30 15:30
Analysing the Safety of a Software Development Processated software. This paper describes the experience of performing such a safety analysis, and reflects upon the lessons learnt. It discusses the issues involved in defining the process at the appropriate level of abstraction, and it evaluates the difficulties and benefits of performing Function Failu作者: 你敢命令 時間: 2025-3-30 16:47 作者: incredulity 時間: 2025-3-30 22:58
The Automotive Development Process,ral contemporary schools of thought point out that decomposed descriptions are insufficient, and that a description on the level of the system as a whole is needed instead. The dependability of human-computer systems must therefore refer to the performance characteristics of the joint system, and sp作者: TIA742 時間: 2025-3-31 03:32
The Automotive Development Processciety. The paper briefly discusses the aim and scope of the Dependability Initiative under the Information Society Technologies Programme and presents the activities that have recently being launched in this area to prepare the forthcoming Framework Programme 6. of the European Commission.作者: Folklore 時間: 2025-3-31 06:39 作者: fluoroscopy 時間: 2025-3-31 13:04
The Automotive Development Processiety members. Through case study material we explicate how dependability is a practical achievement and how it is constituted as a common sense notion. We show how attending to the logical grammar of dependability can clarify some issues and potential conceptual confusions around the term that occur作者: TRAWL 時間: 2025-3-31 16:48 作者: NADIR 時間: 2025-3-31 21:21 作者: 描述 時間: 2025-4-1 01:28 作者: 污穢 時間: 2025-4-1 05:25
https://doi.org/10.1007/BFb0039443ems. Especially the probability that a systems operates (safely) using the probabilities that its components operate is a vital system characteristic and its computation is a nontrivial task. The most often used method to solve this problem is to derive disjoint events from the description of the sy