標題: Titlebook: Computer Safety, Reliability, and Security; 22nd International C Stuart Anderson,Massimo Felici,Bev Littlewood Conference proceedings 2003 [打印本頁] 作者: malignant 時間: 2025-3-21 16:32
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)
書目名稱Computer Safety, Reliability, and Security影響因子(影響力)學科排名
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度
書目名稱Computer Safety, Reliability, and Security網(wǎng)絡公開度學科排名
書目名稱Computer Safety, Reliability, and Security被引頻次
書目名稱Computer Safety, Reliability, and Security被引頻次學科排名
書目名稱Computer Safety, Reliability, and Security年度引用
書目名稱Computer Safety, Reliability, and Security年度引用學科排名
書目名稱Computer Safety, Reliability, and Security讀者反饋
書目名稱Computer Safety, Reliability, and Security讀者反饋學科排名
作者: 看法等 時間: 2025-3-21 21:12 作者: Infelicity 時間: 2025-3-22 00:53
Visual Modeling and Verification of Distributed Reactive Systemsive systems. A distributed reactive system is composed of a collection of autonomous reactive nodes which communicate over buffered and/or unbuffered channels . Statecharts are industry accepted formal notation to model reactive systems but lack features to model communication. We have extended . [1作者: 低三下四之人 時間: 2025-3-22 07:32 作者: 江湖郎中 時間: 2025-3-22 09:29
Improving System Reliability via Model Checking: The FSAP/NuSMV-SA Safety Analysis Platformeir environment. Such growing complexity requires an adequate increase in the capability of safety engineers to assess system safety, including analyzing the bahaviour of a system in degraded situations. Formal verification techniques, like symbolic model checking, have the potential of dealing with作者: Largess 時間: 2025-3-22 15:16
Integrity Static Analysis of COTS/SOUPe static analysis was part of an overall software qualification programme, which also included the work reported in our paper presented at Safecomp 2002. Integrity static analysis focuses on unsafe language constructs and “covert” flows, where one thread can affect the data or control flow of anothe作者: Largess 時間: 2025-3-22 19:45
Safety Lifecycle for Developing Safety Critical Artificial Neural Networksormance of neural networks for safety-critical systems. However, there is a complete absence of analytical certification methods for neural network paradigms. Consequently, their role in safety-critical applications, if any, is typically restricted to advisory systems. It is therefore desirable to e作者: Colonnade 時間: 2025-3-23 01:04 作者: 同時發(fā)生 時間: 2025-3-23 02:01 作者: 打谷工具 時間: 2025-3-23 09:14 作者: 鑒賞家 時間: 2025-3-23 12:22
A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integritywever, in a complex application system it is possible that an integrity policy may have been incorrectly specified and, as a result, a user may be authorized to modify information that can lead to an unexpected system compromise. In this paper we propose a scalable and quantitative technique that us作者: 含糊其辭 時間: 2025-3-23 15:59
Software Tamper Resistance Using Program Certificateseceive a new cryptograghic key after each pre-set period of time in order to continue function. The software execution integrity is checked by the authority when deciding whether or not to give out a new key. If the modification of the software execution causes an error in the computational result, 作者: 原告 時間: 2025-3-23 21:18
Developing High Assurance Systems: On the Role of Software Toolsools have largely been used to analyze hardware designs. In the future, they should have significant value for analyzing the requirements and designs of software systems, especially ., where compelling evidence is needed that the system satisfies critical properties, such as safety and security prop作者: ANN 時間: 2025-3-24 00:00
Web Service Availability – Impact of Error Recoverynet is often used for transaction based applications such as online banking, stock trading, shopping, where the service interruption or outages are unacceptable. Therefore, it is important for the developers of such applications to analyze during the design phase how hardware, software and performan作者: 彎曲的人 時間: 2025-3-24 04:38 作者: Mediocre 時間: 2025-3-24 08:31
An Approach to Trust Case Developmenttribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ concerning thei作者: Tempor 時間: 2025-3-24 11:24 作者: 熱心助人 時間: 2025-3-24 16:15 作者: 小木槌 時間: 2025-3-24 22:52 作者: 非實體 時間: 2025-3-25 00:17 作者: EWER 時間: 2025-3-25 06:19 作者: cortex 時間: 2025-3-25 11:34 作者: 六個才偏離 時間: 2025-3-25 15:10 作者: 容易懂得 時間: 2025-3-25 18:42 作者: 谷物 時間: 2025-3-25 20:34
Visual Modeling and Verification of Distributed Reactive Systems notation. The model was translated into Promela using the CSPROM tool and we have used the translated model in Promela to show the correctness of the algorithm by verifying its known properties. The verification was carried out using the Spin model checker. The contribution of the paper is in exten作者: 流眼淚 時間: 2025-3-26 02:20
Improving System Reliability via Model Checking: The FSAP/NuSMV-SA Safety Analysis Platformtems, failure ordering analysis. The goal is to provide an environment that can be used both by design engineers to formally verify a system and by safety engineers to automate certain phases of safety assessment. The platform is being developed within the ESACS project (Enhanced Safety Analysis for作者: bleach 時間: 2025-3-26 07:33 作者: FEAT 時間: 2025-3-26 12:17
Quantitative Reliability Estimation of a Computer-Based Motor Protection Relay Using Bayesian Networ reliability estimations of computer-based systems. Bayesian networks are particularly useful when different kinds of evidence is introduced and combined in the same assessment. The assessment method described in the paper gives informative posterior probability distributions for the failure rates o作者: NOVA 時間: 2025-3-26 14:46 作者: 無聊的人 時間: 2025-3-26 17:47 作者: 尾巴 時間: 2025-3-26 21:07 作者: 開頭 時間: 2025-3-27 01:25
Conference proceedings 2003d Security, has contributed to the progress of the state of the art in dependable applications of computer systems. SAFECOMP provides ample opportunity to exchange insights and experiences in emerging methods across the borders of different disciplines. SAFECOMP year after year registers new multidi作者: mendacity 時間: 2025-3-27 07:52 作者: avulsion 時間: 2025-3-27 10:30 作者: Servile 時間: 2025-3-27 16:23
https://doi.org/10.1007/978-3-540-78729-7horized to modify information that can lead to an unexpected system compromise. In this paper we propose a scalable and quantitative technique that uses constraint solving to model and analyze the effectiveness of application system integrity policies.作者: congenial 時間: 2025-3-27 21:01
Automatic Timeliness Verification of a Public Mobile NetworkMNs in a BS cell, is always below a preassigned threshold. Our experimental results show that Model Checking can be successfully used to generate worst case scenarios and nicely complements probabilistic methods and simulation which are typically used for performance evaluation.作者: 招惹 時間: 2025-3-28 01:02
A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrityhorized to modify information that can lead to an unexpected system compromise. In this paper we propose a scalable and quantitative technique that uses constraint solving to model and analyze the effectiveness of application system integrity policies.作者: Accomplish 時間: 2025-3-28 04:10
The Butterfly Effect in Competitive Marketsa confident assessment that the system is, indeed, safe enough. Such conventional wisdom is founded on a number of unstated axioms, but computing is a young discipline and progress has thrown doubt on these assumptions. It is time for a new approach to safety assurance.作者: cardiac-arrest 時間: 2025-3-28 10:01 作者: Impugn 時間: 2025-3-28 10:25 作者: Compatriot 時間: 2025-3-28 15:49 作者: insert 時間: 2025-3-28 20:29 作者: 表示向下 時間: 2025-3-29 02:02 作者: Hirsutism 時間: 2025-3-29 05:27 作者: CLASH 時間: 2025-3-29 07:38
Byzantine Fault Tolerance, from Theory to Realityas a theoretical perspective. A discussion of typical failure properties and the difficulties in preventing the associated failure propagation is presented. These are illustrated with real Byzantine failure observations. Finally, various architectural solutions to the Byzantine problem are presented.作者: 黃油沒有 時間: 2025-3-29 11:47
Developing High Assurance Systems: On the Role of Software Toolserties. This paper briefly describes the different roles that formally based software tools can play in debugging, verifying, and testing software systems and software system artifacts. It also describes one important activity in software development not involving tools that is often neglected and that merits greater care and attention.作者: Heretical 時間: 2025-3-29 17:45
A Unified Tool for Performance Modelling and Prediction through an intermediate language, the stochastic process algebra PEPA, before translation into MTBDDs for solution. We illustrate our approach on a real-world analysis problem from the domain of mobile telephony.作者: 匯總 時間: 2025-3-29 21:00
An Approach to Trust Case Developmentr abstraction level and scope. To express a claim we need a language and a conceptual model. We used UML to represent claim models and related context models of the trust case. To specify claims we introduced . – CDL. The paper gives a deeper description of the above concepts and illustrates how they were applied in practice.作者: larder 時間: 2025-3-30 03:43 作者: Capitulate 時間: 2025-3-30 05:32 作者: Osteoarthritis 時間: 2025-3-30 09:31 作者: MAPLE 時間: 2025-3-30 15:21
Honeybee Sex, and Virgin Brides,elopment of trustworthy security-critical systems using the computer-aided systems engineering tool . to the particular problem of layered security protocols. We explain our method at the example of a banking application which is currently under development by a major German bank and is about to be put to commercial use.作者: 后天習得 時間: 2025-3-30 18:23
Honeybee Sex, and Virgin Brides,an grow, shrink and change dynamically. The paper argues that off-the-shelf commercial database solutions are not suitable, and describes the design and operation of a novel approach we have implemented in a prototype.作者: Iatrogenic 時間: 2025-3-30 21:30
Elicitation and Validation of Graphical Dependability Modelsthe class of . Markov non-equivalent graphical models consistent with those statements. For . of these models, we can produce alternative, but formally Markov equivalent, graphical representations. Comparing different graphical models highlights subsets of their underlying assumptions.作者: GEON 時間: 2025-3-31 02:20
A Dependability Model for Domestic Systemsn particular, for systems in the home, we argue that the notion of dependability should be broadened This paper suggests that through the design of assistive technology (AT) systems for older people we can demonstrate the user should be placed at the centre of the process when considering system dependability.作者: 粘土 時間: 2025-3-31 08:46 作者: Accomplish 時間: 2025-3-31 11:46 作者: 感情脆弱 時間: 2025-3-31 14:41
Honeybee Sex, and Virgin Brides,erties. This paper briefly describes the different roles that formally based software tools can play in debugging, verifying, and testing software systems and software system artifacts. It also describes one important activity in software development not involving tools that is often neglected and that merits greater care and attention.作者: aplomb 時間: 2025-3-31 19:18
,Honeybees — a Model for Success, through an intermediate language, the stochastic process algebra PEPA, before translation into MTBDDs for solution. We illustrate our approach on a real-world analysis problem from the domain of mobile telephony.作者: fledged 時間: 2025-4-1 00:04
Epilog: The Future for Bees and Mankind,r abstraction level and scope. To express a claim we need a language and a conceptual model. We used UML to represent claim models and related context models of the trust case. To specify claims we introduced . – CDL. The paper gives a deeper description of the above concepts and illustrates how they were applied in practice.作者: 捏造 時間: 2025-4-1 04:41
,Honeybees — a Model for Success, others. The root of the assumption tree is the critical feature of interest, and its leaves represent assumptions which, if not valid, might cause the critical feature to fail. The analysis revealed some unexpected assumptions that motivated improvements to the code.作者: 不妥協(xié) 時間: 2025-4-1 08:41 作者: 制定法律 時間: 2025-4-1 13:27
978-3-540-20126-7Springer-Verlag Berlin Heidelberg 2003作者: Amnesty 時間: 2025-4-1 18:01
The Butterfly Effect in Competitive Marketsred service and will not cause or allow an accident to occur. It is very difficult to provide such evidence before the system is put to use, yet that is exactly what is required by society and regulators, and rightly so. Conventional wisdom recommends that systems are classified into safety integrit作者: Mere僅僅 時間: 2025-4-1 22:08
Challenges of the Butterfly Effectof the assumed . (statistical associations) of multivariate probability distributions. These powerfully ‘visual’, yet mathematically formal, representations have been studied theoretically, and applied in varied contexts, mainly during the last 15 years. Here, we explore the application of recent .