Computer safety, reliability, and security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings /

This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers ar...

Full description

Corporate Authors: SAFECOMP (Conference) Trondheim, Norway)
Other Authors: SAFECOMP (Conference), Skavhaug, Amund, 1965-, Guiochet, Jérémie,, Bitsch, Friedemann,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Switzerland : Springer, 2016.
Physical Description: 1 online resource.
Series: Lecture notes in computer science ; 9922.
LNCS sublibrary. Programming and software engineering.
Subjects:
LEADER 08501cam a2201201Ii 4500
001 958423211
003 OCoLC
005 20240223121953.0
006 m o d
007 cr bn|---aucuu
008 160915s2016 sz o 101 0 eng d
015 |a GBB8M2424  |2 bnb 
016 7 |a 019135850  |2 Uk 
019 |a 959952759  |a 960088010  |a 961007270  |a 1227400788 
020 |a 9783319454771  |q (electronic bk.) 
020 |a 3319454773  |q (electronic bk.) 
020 |z 9783319454764  |q (print) 
024 7 |a 10.1007/978-3-319-45477-1  |2 doi 
035 |a (OCoLC)958423211  |z (OCoLC)959952759  |z (OCoLC)960088010  |z (OCoLC)961007270  |z (OCoLC)1227400788 
037 |a com.springer.onix.9783319454771  |b Springer Nature 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d OCLCO  |d YDX  |d OCLCF  |d OCLCO  |d COO  |d QCL  |d OCLCQ  |d IOG  |d IAD  |d JBG  |d ICW  |d ILO  |d ICN  |d ESU  |d U3W  |d OCLCA  |d CAUOI  |d JG0  |d KSU  |d EBLCP  |d WYU  |d UKMGB  |d AUD  |d OCLCQ  |d SFB  |d UKAHL  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a COM6 
050 4 |a QA76.9.A25 
072 7 |a UM  |2 bicssc 
072 7 |a UYF  |2 bicssc 
072 7 |a COM051000  |2 bisacsh 
072 7 |a COM036000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
111 2 |a SAFECOMP (Conference)  |n (35th :  |d 2016 :  |c Trondheim, Norway) 
245 1 0 |a Computer safety, reliability, and security :  |b 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings /  |c Amund Skavhaug, Jérémie Guiochet, Friedemann Bitsch (eds.). 
264 1 |a Switzerland :  |b Springer,  |c 2016. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Lecture notes in computer science ;  |v 9922. 
490 1 |a LNCS sublibrary. SL 2, Programming and software engineering. 
500 |a International conference proceedings. 
500 |a Includes author index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed September 15, 2016). 
520 |a This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anomaly detection and resilience, cyber security, fault trees, and safety analysis. 
505 0 |a Intro; Preface; Organization; Contents; Fault Injection; FISSC: A Fault Injection and Simulation Secure Collection; 1 Introduction; 1.1 Security Assessment Against Fault Injection Attacks; 1.2 The Need for a Code Collection; 2 The VerifyPIN Example; 3 The FISSC Framework; 3.1 Contents and File Organization; 3.2 The VerifyPIN Suite; 4 Comparing Tools; 4.1 Case Study; 4.2 Interpretation; 5 Conclusion; References; FIDL: A Fault Injection Description Language for Compiler-Based SFI Tools; 1 Introduction; 2 Background; 2.1 LLFI; 2.2 Aspect-Oriented Programming (AOP); 3 Related Work. 
505 8 |a 4 System Overview4.1 FIDL Structure; 4.2 Aspect Design; 5 Evaluation Metrics; 6 Evaluation; 6.1 Experimental Setup; 6.2 Experimental Results; 7 Summary; References; Safety Assurance; Using Process Models in System Assurance; 1 Introduction and Motivation; 2 Process Models; 3 Confidence Argument Patterns; 4 Instantiating Argument Patterns; 5 Conclusions; References; The Indispensable Role of Rationale in Safety Standards; Abstract; 1 Introduction; 2 Current Standards; 2.1 Development of Standards; 2.2 Using Standards; 2.3 Maintenance of Standards; 3 Rationalized Standards; 3.1 The Concept. 
505 8 |a 3.2 Defining Reasoning3.3 Defining Guidance; 4 Analysis of a Safety Standard; 4.1 Example Element; 4.2 Analysis of Example Element; 4.3 Rationalized Standard Fragment; 5 Conclusion; Acknowledgment; References; Composition of Safety Argument Patterns; 1 Introduction; 2 Illustrative Example; 3 Pattern Composition; 3.1 Composition; 3.2 Correctness; 3.3 General Composition; 4 Application; 5 Related Work and Conclusions; References; Formal Verification; Formal Analysis of Security Properties on the OPC-UA SCADA Protocol; 1 Introduction; 2 OPC-UA OpenSecureChannel; 2.1 Modeling; 2.2 Results. 
505 8 |a 2.3 Fixed Version3 OPC-UA CreateSession; 3.1 Modeling; 3.2 Results; 4 Conclusion; References; A Dedicated Algorithm for Verification of Interlocking Systems; 1 Introduction; 2 Interlocking Principles; 3 Verification Algorithm; 4 Experiments; 5 Conclusion; References; Catalogue of System and Software Properties; 1 Introduction; 2 Scope and Known Limitations; 3 Requirements Taxonomy and Design Attributes; 4 The CSSP; 4.1 Formalization of the CSSP; 4.2 Coverage of the Design Attributes; 4.3 COMPASS Tool Support; 4.4 Example; 5 Conclusions and Future Work; References. 
505 8 |a A High-Assurance, High-Performance Hardware-Based Cross-Domain System1 Introduction; 1.1 Guardol for Cross-Domain Systems; 1.2 Guardol and Hardware-Based Guards; 2 The Guardol Toolchain; 2.1 Guardol IDE; 2.2 Verification; 3 Adding Regular Expressions to Guardol; 3.1 Proof Translation; 3.2 Code Translation; 4 Guardol VHDL Code Generation; 5 FPGA-Based Guard Architecture and Implementation; 6 Results; 7 Related Work; 8 Conclusion; References; Automotive; Using STPA in an ISO 26262 Compliant Process; 1 Introduction; 2 Preliminaries; 2.1 Systems Theoretic Process Analysis (STPA) 
650 0 |a Computer security  |v Congresses. 
650 0 |a Computer systems  |x Reliability  |v Congresses. 
650 6 |a Sécurité informatique  |v Congrès. 
650 6 |a Systèmes informatiques  |x Fiabilité  |v Congrès. 
650 7 |a Programming & scripting languages: general.  |2 bicssc. 
650 7 |a Software Engineering.  |2 bicssc. 
650 7 |a Computer security.  |2 bicssc. 
650 7 |a Information technology: general issues.  |2 bicssc. 
650 7 |a Computer networking & communications.  |2 bicssc. 
650 7 |a Computer programming  |x software development.  |2 bicssc. 
650 7 |a Computers  |x Programming Languages  |x General.  |2 bisacsh. 
650 7 |a Computers  |x Software Development & Engineering  |x General.  |2 bisacsh. 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh. 
650 7 |a Computers  |x Data Processing.  |2 bisacsh. 
650 7 |a Computers  |x Hardware  |x General.  |2 bisacsh. 
650 7 |a Computers  |x Programming  |x General.  |2 bisacsh. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Computer systems  |x Reliability.  |2 fast. 
655 2 |a Congress. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Skavhaug, Amund,  |d 1965-  |e editor. 
700 1 |a Guiochet, Jérémie,  |e editor. 
700 1 |a Bitsch, Friedemann,  |e editor. 
710 2 |a SpringerLink (Online service) 
776 |z 3-319-45476-5. 
830 0 |a Lecture notes in computer science ;  |v 9922. 
830 0 |a LNCS sublibrary.  |n SL 2,  |p Programming and software engineering. 
907 |a .b52832508  |b multi  |c -  |d 161102  |e 240320 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g sz   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Overnight, in 2023.01 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.09 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150479797  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-319-45477-1  |3 SpringerLink  |z Click here for access