Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant (English)
- New search for: Lee, J.-S.
- New search for: Lindner, A.
- New search for: Choi, J.-G.
- New search for: Miedl, H.
- New search for: Kwon, K.-C.
- New search for: Lee, J.-S.
- New search for: Lindner, A.
- New search for: Choi, J.-G.
- New search for: Miedl, H.
- New search for: Kwon, K.-C.
- New search for: Gorski, Janusz
In:
SAFECOMP 2006; Computer safety, reliability, and security
4166
;
85-98
;
2006
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power Plant
-
Contributors:Lee, J.-S. ( author ) / Lindner, A. ( author ) / Choi, J.-G. ( author ) / Miedl, H. ( author ) / Kwon, K.-C. ( author ) / Gorski, Janusz
-
Conference:SAFECOMP 2006; Computer safety, reliability, and security ; 2006 ; Gdansk, Poland
-
Published in:SAFECOMP 2006; Computer safety, reliability, and security , 4166 ; 85-98LECTURE NOTES IN COMPUTER SCIENCE , 4166 ; 85-98
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2006-01-01
-
Size:14 pages
-
Remarks:International conference proceedings.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
System of Systems Hazard Analysis Using Simulation and Machine LearningAlexander, R. / Kazakov, D. / Kelly, T. et al. | 2006
- 15
-
Through the Description of Attacks: A Multidimensional ViewFovino, I. N. / Masera, M. et al. | 2006
- 29
-
On Certain Behavior of Scale-Free Networks Under Malicious AttacksGierszewski, T. / Molisz, W. / Rak, J. et al. | 2006
- 42
-
Verifying a Chipcard-Based Biometric Identification Protocol in VSECheikhrouhou, L. / Rock, G. / Stephan, W. / Schwan, M. / Lassmann, G. et al. | 2006
- 57
-
Exploring Resilience Towards Risks in eOperations in the Oil and Gas IndustryRydzak, F. / Breistrand, L. S. / Sveen, F. O. / Qian, Y. / Gonzalez, J. J. et al. | 2006
- 71
-
Computer System Survivability Modelling by Using Stochastic Activity NetworkGarsva, E. et al. | 2006
- 85
-
Software Safety Lifecycles and the Methods of a Programmable Electronic Safety System for a Nuclear Power PlantLee, J.-S. / Lindner, A. / Choi, J.-G. / Miedl, H. / Kwon, K.-C. et al. | 2006
- 99
-
Regulatory Software Configuration Management System DesignChou, I.-H. / Fan, C.-F. et al. | 2006
- 113
-
Gaining Confidence in the Software Development Process Using Expert SystemsBrito, M. / May, J. et al. | 2006
- 127
-
Retrenchment, and the Generation of Fault Trees for Static, Dynamic and Cyclic SystemsBanach, R. / Bozzano, M. et al. | 2006
- 142
-
Stepwise Development of Secure SystemsSanten, T. et al. | 2006
- 156
-
Component-Based Hazard Analysis: Optimal Designs, Product Lines, and Online-ReconfigurationGiese, H. / Tichy, M. et al. | 2006
- 170
-
New VoIP Traffic Security Scheme with Digital WatermarkingMazurczyk, W. / Kotulski, Z. et al. | 2006
- 182
-
Towards Filtering and Alerting Rule Rewriting on Single-Component PolicesGarcia-Alfaro, J. / Cuppens, F. / Cuppens-Boulahia, N. et al. | 2006
- 195
-
Using Group Overlapping to Protect Server from Attack in Grid ComputingKim, B. et al. | 2006
- 205
-
The Role of Situation Awareness in Assuring Safety of Autonomous VehiclesWardzinski, A. et al. | 2006
- 219
-
Demonstration of Safety in Healthcare OrganisationsSujan, M.-A. / Harrison, M. D. / Steven, A. / Pearson, P. H. / Vernon, S. J. et al. | 2006
- 233
-
Healthcare System Architecture, Economic Value, and Policy Models in Large-Scale Wireless Sensor NetworksSong, W. J. / Cho, M. K. / Ha, I. S. / Choi, M. K. et al. | 2006
- 247
-
Assessment of Hazard Identification Methods for the Automotive DomainTorner, F. / Johannessen, P. / Ohman, P. et al. | 2006
- 261
-
A Tool for Databus Safety Analysis Using Fault InjectionTrawczynski, D. / Sosnowski, J. / Zalewski, J. et al. | 2006
- 275
-
Towards a Unified Model-Based Safety AssessmentPeikenkamp, T. / Cavallo, A. / Valacca, L. / Bode, E. / Pretzer, M. / Hahn, E. M. et al. | 2006
- 289
-
Reliability Analysis of Resilient Packet RingsCholda, P. / Domzal, J. / Jajszczyk, A. / Wajda, K. et al. | 2006
- 302
-
Experiences with the Design of a Run-Time Checkvan der Meulen, M. J. P. / Revilla, M. A. et al. | 2006
- 316
-
Development of an Integrated, Risk-Based Platform for Information and E-Services SecurityBialas, A. et al. | 2006
- 330
-
Using Agent-Based Modelling Approaches to Support the Development of Safety Policy for Systems of SystemsHall-May, M. / Kelly, T. et al. | 2006
- 344
-
Verification of Automatic Train Protection Systems with RTCP-NetsSzpyrka, M. / Szmuc, T. et al. | 2006
- 358
-
Checking SCADE Models for Correct Usage of Physical UnitsSchlick, R. / Herzner, W. / Le Sergent, T. et al. | 2006
- 372
-
Validation and Certification of Safety-Critical Embedded Systems - The DECOS Test BenchSchoitsch, E. / Althammer, E. / Eriksson, H. / Vinter, J. / Gonczy, L. / Pataricza, A. / Csertan, G. et al. | 2006
- 386
-
Encapsulating Application Subsystems Using the DECOS Core OSSchlager, M. / Herzner, W. / Wolf, A. / Grundonner, O. / Rosenblattl, M. / Erkinger, E. et al. | 2006
- 398
-
Modeling the Railway Control Domain Rigorously with a UML 2.0 ProfileBerkenkotter, K. / Hannemann, U. et al. | 2006
- 412
-
Access Control Coherence of Information Systems Based on Security ConstraintsPoniszewska-Maranda, A. et al. | 2006
- 426
-
Automatic Test Data Generation by Multi-objective OptimisationOster, N. / Saglietti, F. et al. | 2006