close
1.

図書

図書
Burton S. Kaliski, Jr., Çetin K. Koç, Christof Paar (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiv, 612 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2523
所蔵情報: loading…
2.

図書

図書
Maritta Heisel, Peter Liggesmeyer, Stefan Wittmann (eds.)
出版情報: Berlin : Springer, c2004  xi, 337 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3219
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
The Deconstruction of Safety Arguments Through Adversarial Counter-Argument / J.M. Armstrong ; S.E. Paynter
Using Fuzzy Self-Organising Maps for Safety Critical Systems / Z. Kurd ; T.P. Kelly
Using Formal Methods in a Retrospective Safety Case / L.-H. Eriksson
Reliability
A Highly Fault Detectable Cache Architecture for Dependable Computing / H.R. Zarandi ; S.G. Miremadi
An Empirical Exploration of the Difficulty Function / J.G.W. Bentley ; P.G. Bishop ; M. van der Meulen
Towards the Integration of Fault, Resource, and Power Management / T. Saridakis
Human Factors
Modeling Concepts for Safety-Related Requirements in Sociotechnical Systems / M. Cebulla
Analysing Mode Confusion: An Approach Using FDR2 / B. Buth
Handling Safety Critical Requirements in System Engineering Using the B Formal Method / D. Essame
Transportation
A Hybrid Testing Methodology for Railway Control Systems / G. De Nicola ; P. di Tommaso ; R. Esposito ; F. Flammini ; A. Orazzo
Actuator Based Hazard Analysis for Safety Critical Systems / P. Johannessen ; F. Torner ; J. Torin
Performability Measures of the Public Mobile Network of a Tele Control System / E. Ciancamerla ; M. Minichino
Software Development
PLC-Based Safety Critical Software Development for Nuclear Power Plants / J. Yoo ; S. Cha ; H.S. Son ; C.H. Kim ; J.-S. Lee
Compositional Hazard Analysis of UML Component and Deployment Models / H. Giese ; M. Tichy ; D. Schilling
Automatic Test Data Generation from Embedded C Code / E. Dillon ; C. Meudec
Fault Tree Analysis
State-Event-Fault-Trees - A Safety Analysis Model for Software Controlled Systems / B. Kaiser ; C. Gramlich
Safety Requirements and Fault Trees Using Retrenchment / R. Banach ; R. Cross
The Effects on Reliability of Integration of Aircraft Systems Based on Integrated Modular Avionics / D. Rehage ; U.B. Carl ; M. Merkel ; A. Vahl
Automotive Telematics - Road Safety Versus IT Security? / R.G. Herrtwich
Formal Methods and Systems
Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture / H. Pfeifer ; F.W. von Henke
Refinement of Fault Tolerant Control Systems in B / L. Laibinis ; E. Troubitsyna
Numerical Integration of PDEs for Safety Critical Applications Implemented by I&C Systems / M. Vollmer
Security and Quality of Service
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth / A. Aldini ; M. Bernardo
Dependability Benchmarking of Web-Servers / J. Duraes ; M. Vieira ; H. Madeira
Hazard and Risk Analysis
An Approach for Model-Based Risk Assessment / B.A. Gran ; R. Fredriksen ; A.P.-J. Thunem
How Explicit Are the Barriers to Failure in Safety Arguments? / S.P. Smith ; M.D. Harrison ; B.A. Schupp
Author Index
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
3.

図書

図書
Kan Zhang, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2004  xii, 442 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3225
所蔵情報: loading…
目次情報: 続きを見る
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
Storage-Efficient Stateless Group Key Revocation / Pan Wang ; Peng Ning ; Douglas S. Reeves
Digital Signatures
Low-Level Ideal Signatures and General Integrity Idealization / Michael Backes ; Birgit Pfitzmann ; Michael Waidner
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA / Julien Cathalo ; Benoît Libert ; Jean-Jacques Quisquater
How to Break and Repair a Universally Composable Signature Functionality / Dennis Hofheinz
New Algorithms
RSA Accumulator Based Broadcast Encryption / Craig Gentry ; Zulfikar Ramzan
Chameleon Hashing Without Key Exposure / Xiaofeng Chen ; Fangguo Zhang ; Kwangjo Kim
Radix-r Non-Adjacent Form / Tsuyoshi Takagi ; Sung-Ming Yen ; Bo-Ching Wu
Cryptanalysis
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor / Raphael C.-W. Phan ; Helena Handschuh
Security Analysis of Two Signcryption Schemes / Guilin Wang ; Robert H. Deng ; DongJin Kwak ; SangJae Moon
On The Security of Key Derivation Functions / Carlisle Adams ; Guenther Kramer ; Serge Mister ; Robert Zuccherato
Intrusion Detection
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery / Hai Wang ; Peng Liu ; Lunqun Li
A Model for the Semantics of Attack Signatures in Misuse Detection Systems / Michael Meier
Detection of Sniffers in an Ethernet Network / Zouheir Trabelsi ; Hamza Rahmani
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks / Mark Foster ; Joseph N. Wilson ; Shigang Chen
Securing DBMS: Characterizing and Detecting Query Floods / Elisa Bertino ; Teodoro Leggieri ; Evimaria Terzi
Access Control
An XML-Based Approach to Document Flow Verification / Elena Ferrari ; Giovanni Mella
Model-Checking Access Control Policies / Dimitar P. Guelev ; Mark Ryan ; Pierre Yves Schobbens
A Distributed High Assurance Reference Monitor / Ajay Chander ; Drew Dean ; John Mitchell
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control / D. Nali ; C. Adams ; A. Miri
Human Authentication
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security) / Richard Bergmair ; Stefan Katzenbeisser
Image Recognition CAPTCHAs / Monica Chew ; J.D. Tygar
Certificate Management
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model / Zhengyi Le ; Yi Ouyang ; James Ford ; Fillia Makedon
Certificate Recommendations to Improve the Robustness of Web of Trust / Qinglin Jiang
Mobile and Ad Hoc Security
Universally Composable Secure Mobile Agent Computation / Ke Xu ; Stephen R. Tate
Re-thinking Security in IP Based Micro-Mobility / Jukka Ylitalo ; Jan Melén ; Pekka Nikander ; Vesa Torvinen
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group / Qianhong Wu ; Changjie Wang ; Yumin Wang
Web Security
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions / HongQian Karen Lu ; Asad Ali
Provable Unlinkability Against Traffic Analysis Already After <$>{\cal O}<$>(log(n)) Steps! / Marcin Gomułkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
An Efficient Online Electronic Cash with Unlinkable Exact Payments / Toru Nakanishi ; Mitsuaki Shiota ; Yuji Sugiyama
Digital Rights Management
Modifiable Digital Content Protection in P2P / Heejae Park ; Jong Kim
Survey on the Technological Aspects of Digital Rights Management / William Ku ; Chi-Hung Chi
Detecting Software Theft via Whole Program Path Birthmarks / Ginger Myles ; Christian Collberg
Software Security
Effective Security Requirements Analysis: HAZOP and Use Cases / Thitima Srivatanakul ; John A. Clark ; Fiona Polack
The Obfuscation Executive / Kelly Heffner
Author Index
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
4.

図書

図書
Howard Heys, Carlisle Adams (eds.)
出版情報: Berlin : Springer, c2000  viii, 241 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1758
所蔵情報: loading…
5.

図書

図書
Andreas Pfitzmann (ed.)
出版情報: Berlin : Springer, c2000  ix, 492 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1768
所蔵情報: loading…
目次情報: 続きを見る
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
Steganography: Paradigms and Examples
Steganography Secure against Cover-Stego-Attacks / Elke Franz ; Andreas Pfitzmann
Secure Steganographic Methods for Palette Images / Jiri Fridrich ; Rui Du
Attacks on Steganographic Systems / Andreas Westfeld
Beyond Symmetric Steganography
Developments in Steganography / Joshua R. Smith ; Chris Dodge
An Asymmetric Public Detection Watermarking Technique / Teddy Furon ; Pierre Duhamel
Zero Knowledge Watermark Detection / Scott Craver
Watermarking: Proving Ownership
Proving Ownership of Digital Content / André Adelsbach ; Birgit Pfitzmann ; Ahmad-Reza Sadeghi
Error- and Collusion-Secure Fingerprinting for Digital Data / Hans-Jürgen Guth
Watermarking: Detection and Decoding
Computing the Probability of False Watermark Detection / Matt L. Miller ; Jeffrey A. Bloom
Optimum Decoding of Non-additive Full Frame DFT Watermarks / Alessia De Rosa ; Mauro Barni ; Franco Bartolini ; Vito Cappellini ; Alessandro Piva
Watermark Detection after Quantization Attacks / Joachim J. Eggers ; Bernd Girod
Content-Based Watermarking for Image Authentication / Pedro Lamy ; José Martinho ; Tiago Rosa ; Maria Paula Queluz
Watermarking: Embedding Techniques
Fast Robust Template Matching for Affine Resistant Image Watermarks / Shelby Pereira ; Thierry Pun
A Stochastic Approach to Content Adaptive Digital Image Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Nazanin Baumgaertner
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation / Martin Kutter
Watermarking: New Designs and Applications
On the Design of a Watermarking System: Considerations and Rationales / Jean-Paul Linnartz ; Geert Depovere ; Ton Kalker
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking / Gabriella Csurka ; Frédéric Deguillaume ; Joseph J. K. Ó Ruanaidh
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware / John Lach ; William H. Mangione-Smith ; Miodrag Potkonjak
Watermarking: Improving Robustness
Robust Watermarking for Images Based on Color Manipulation / Sebastiano Battiato ; Dario Catalano ; Giovanni Gallo ; Rosario Gennaro
Recovery of Watermarks from Distorted Images / Neil F. Johnson ; Zoran Duric ; Sushil Jajodia
Cocktail Watermarking on Images / Chun-Shien Lu ; Hong-Yuan Mark Liao ; Shih-Kun Huang ; Chwen-Jye Sze
Watermarking and Software Protection
Hiding Signatures in Graph Coloring Solutions / Gang Qu
Robust Object Watermarking: Application to Code / Julien P. Stern ; Gaël Hachez ; François Koeune ; Jean-Jacques Quisquater
Software DisEngineering: Program Hiding Architecture and Experiments / Enriquillo Valdez ; Moti Yung
The Difficulty of Separating Private and Public Information
Chaffing at the Bit: Thoughts on a Note by Ronald Rivest / John McHugh
An Entropy-Based Framework for Database Inference / Ira S. Moskowitz ; LiWu Chang
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms / Talat Mert DoGu ; Anthony Ephremides
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast / Frank Stajano ; Ross Anderson
Stego-Engineering
Protecting Secret Keys in a Compromised Computational System / W. P. R. Mitchell
StegFS: A Steganographic File System for Linux / Andrew D. McDonald ; Markus G. Kuhn
Nonbinary Audio Cryptography / Yvo Desmedt ; Tri V. Le
Author Index
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
6.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c1999  viii, 239 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Welcome
Formal Models
A Formal Framework and Evaluation Method for Network Denial of Service / C. Meadows
I/O Automaton Models and Proofs for Shared-Key Communication Systems / N. Lynch
Security Protocol Analysis: Notation, Transformation, and Simplification
Safe Simplifying Transformations for Security Protocols / M. Hui ; G. Lowe
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief / D. Monniaux
A Meta-Notation for Protocol Analysis / I. Cervesato ; N. Durgin ; P. Lincoln ; J. Mitchell ; A. Scedrov
Strand Spaces
Mixed Strand Spaces / F. Thayer ; J. Herzog ; J. Guttman
Honest Functions and their Application to the Analysis of Cryptographic Protocols / A. Maneki
Panel: Formalization and Proof of Secrecy Properties / D. Volpano ; M. Abadi ; R. Focardi ; J. Millen
Formalization and Proof of Secrecy Properties
Local Names
Authentication via Localized Names / C. Bodei ; P. Degano ; C. Priami
A Logic for SDSI's Linked Local Name Spaces / J. Halpern ; R. van der Meyden
Interaction and Composition
Trusted System Construction / C. O'Halloran
Secure Composition of Insecure Components / P. Sewell ; J. Vitek
Security Function Interactions / P. Bieber
Logics for Authorization and Access Control
A Logic-based Knowledge Representation for Authorization with Delegation / N. Li ; J. Feigenbaum ; B. Grosof
A Logical Framework for Reasoning on Data Access Control Policies / E. Bertino ; F. Buccafurri ; E. Ferrari ; P. Rullo
Advances in Automated Security Protocol Analysis
Athena: A New Efficient Automatic Checker for Security Protocol Analysis / D. Song
CVS: A Compiler for the Analysis of Cryptographic Protocols / A. Durante ; R. Gorrieri
Noninterference Using Process Algebras
Process Algebra and Non-Interference / P. Ryan ; S. Schneider
What Is Intransitive Noninterference? / A. Roscoe ; M. Goldsmith
Index of Authors
Preface
Workshop Committee
Welcome
7.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2000  xi, 483 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1751
所蔵情報: loading…
目次情報: 続きを見る
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
Some Remarks on a Fair Exchange Protocol / Jianying Zhou ; Robert Deng ; Feng Bao
An Identification Scheme Based on Sparse Polynomials / Seigo Arita ; William D. Banks ; Daniel Lieman ; Igor E. Shparlinski
A State-Based Model for Certificate Management Systems / Chuchang Liu ; Maris A. Ozols ; Marie Henderson ; Tony Cant
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence / Reto Kohlas ; Ueli Maurer
The Composite Discrete Logarithm and Secure Authentication / David Pointcheval
Chosen-Ciphertext Security for Any One-Way Cryptosystem
Short Proofs of Knowledge for Factoring / Guillaume Poupard ; Jacques Stern
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms / X.Y.Wang ; L.C.Hui ; K.P.Chow ; W.W.Tsang ; C.F.Chong ; H.W.Chan
All-or-Nothing Transform and Remotely Keyed Encryption Protocols / Sang Uk Shin ; Weon Shin ; Kyung Hyune Rhee
Security of Public Key Certificate Based Authentication Protocols / Wu Wen ; Takamichi Saito ; Fumio Mizoguchi
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2 / Tetsuya Izu ; Jun Kogure ; Kazuhiro Yokoyama
Key Recovery in Third Generation Wireless Communication Systems / Juanma González Nieto ; DongGook Park ; Colin Boyd ; Ed Dawson
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications / Katsuyuki Okeya ; Hiroyuki Kurumatani ; Kouichi Sakurai
Certificates of Recoverability with Scalable Recovery Agent Security / Eric R. Verheul
Design Validations for Discrete Logarithm Based Signature Schemes / Ernest Brickell ; Serge Vaudenay ; Moti Yung
Optimally Efficient Accountable Time-Stamping / Ahto Buldas ; HelgerLipmaa ; Berry Schoenmakers
"Pseudorandom Intermixing": A Tool for Shared Cryptography / YairFankel ; Philip MacKenzie
RSA-Based Auto-recoverable Cryptosystems / Adam Young
Efficient and Fresh Certification / Irene Gassko ; Peter S. Gemmell
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions / Ronald Cramer ; ard
Cryptographic Approaches to Privacy in Forensic DNA Databases / Philip Bohannon ; Markus Jakobsson ; Sukamol Srikwan
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes / Toru Inoue
An Auction Protocol Which Hides Bids of Losers / Chae Hoon Lim ; Hyo Sun Hwang ; Kazue Sako
Forward Secrecy and Its Application to Future Mobile Communications Security / Sang-Jae Moon
Selecting Cryptographic Key Sizes / Arjen K. Lenstra
A Structured ElGamal-Type Multisignature Scheme / Mike Burmester ; Yvo Desmedt ; Hiroshi Doi ; Masahiro Mambo ; Eiji Okamoto ; Mitsuru Tada ; Yuko Yoshifuji
Author Index
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
8.

図書

図書
V. Michael Bove, Jr. ... [et al.], chairs/editors ; sponsored and publised by SPIE--The International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE--the International Society for Optical Engineering, c1998  viii, 432 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 3228
所蔵情報: loading…
9.

図書

図書
Massimo Felici, Karama Kanoun, Alberto Pasquini (eds.)
出版情報: Berlin ; Tokyo : Springer, c1999  xviii, 482 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1698
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Software Reliability Engineering in Industry / J. D. Musa
Assessment and Certification
A Systematic Approach to Safety Case Maintenance / T. P. Kelly ; J. A. McDermid
SQUALE Dependability Assessment Criteria / Y. Deswarte ; M. Kaâniche ; P. Corneillie ; J. Goodson
Assessment and Certification of Safety-Critical Digital Architectures - The ACRuDA Project / G. Sonneck ; E. Schoitsch
Safety Assessment and Human Factors (Poster Session)
Safety Evaluation of a Train Leader Telephone System / G. Dahll
Safety Analysis Techniques for Validating Formal Models During Verification / R. de Lemos ; A. Saeed
Evaluating the Contribution of DesktopVR for Safety-Critical Applications / C. Johnson
Human Performance Reliability in the Design-for-Usability Life Cycle for Safety Human-Computer Interfaces / L. V. L. Filgueiras
The Impact of Different Media on Safety and Usability of Interactive ATC Applications / F. Paternò ; C. Santoro ; S. Tahmassebi
Human Factors
Patterns for Safer Human-Computer Interfaces / A. Hussey
Impact of Communication on Systems Dependability: Human Factors Perspectives / L. Rognin ; J.-P. Blanquart
A Method for Operator Error Detection Based on Plan Recognition / J. Mo ; Y. Crouzet
Safety Assessment
Hierarchically Performed Hazard Origin and Propagation Studies / Y. Papadopoulos
Hardware Redundant Vital Computer - Demonstration of Safety on the Basis of Current Standards / H. Krebs ; S. Mitra
Design for Safety (Poster Session)
System and Software Safety Analysis for the ERA Control Computer / P.G. Beerthuizen ; W. Kruidhof
Safety Markup Language: Concept and Application / C.-F. Fan ; S. Yih
Extendable Ground-to-Air Communication Architecture for CoDySa / A. Pakstas ; I. Shagaev
Hierarchical Reliability and Safety Models of Fault Tolerant Distributed Industrial Control Systems / J. C. Campelo ; P. Yuste ; F. Rodríguez ; P. J. Gil ; J. J. Serrano
The Development of a Commercial "Shrink-Wrapped Application" to Safety Integrity Level 2: The DUST-EXPERTÖ Story / T. Clement ; I. Cottam ; P. Froome ; C. Jones
Verification and Testing
Safety Verification of Ada 95 Programs Using Software Fault Trees / S.-Y. Min ; Y.-K. Jang ; S.-D. Cha ; Y.-R. Kwon ; D.-H. Bae
Programming Rule Static Verification for Reliable Software / P. Robert
Automated Black-Box Testing with Abstract VDM Oracles / B. K. Aichernig
Towards Statistical Control of an Industrial Test Process / G. Lombardi ; E. Peciola ; R. Mirandola ; A. Bertolino ; E. Marchetti
Design for Safety
Choosing Effective Methods for Diversity - How to Progress from Intuition to Science / P. Popov ; L. Strigini ; A. Romanovsky
A First Step Towards the Integration of Accident Reports and Constructive Design Documents
A Holistic Design Concept to Improve Safety Related Control Systems / M. Wimmer ; A. Rizzo ; M. Sujan
Dependability Analysis and Evaluation
Comparing Fault Trees and Bayesian Networks for Dependability Analysis / A. Bobbio ; L. Portinale ; M. Minichino ; E. Ciancamerla
FlexFi: A Flexible Fault Injection Environment for Microprocessor-Based Systems / A. Benso ; M. Rebaudengo ; M. Sonza Reorda
Structural Software Reliability Estimation / S. Kuball ; J. May ; G. Hughes
Formal Methods and Security (Poster Session)
Hazard Analysis in Formal Specification / K. Sere ; E. Troubitsyna
Modeling Safety-Critical Systems with Z and Petri Nets / M. Heiner ; M. Heisel
On Formal Languages for Sequences of Authorization Transformations / Y. Bai ; V. Varadharajan
Scheduling Fault-Tolerant Programs on Multiple Processors to Maximize Schedule Reliability / I. Czarnowski ; P. Jedrzejowicz ; E. Ratajczak
Formal Methods
Formal Design of Distributed Control Systems with Lustre / P. Caspi ; C. Mazuet ; R. Salem ; D. Weber
Formal Specification and Development of a Safety-Critical Train Management System / A. Chiappini ; A. Cimatti ; C. Porzia ; G. Rotondo ; R. Sebastaini ; P. Traverso ; A. Villafiorita
Formal Validation of the GUARDS Inter-Consistency Mechanism / C. Bernardeschi ; A. Fantechi ; S. Gnesi
A Graphical Environment for the Specification and Verification of Reactive Systems / A. K. Bhattacharjee ; S. D. Dhodapkar ; S. Seshia ; R. K. Shyamasundar
Security
Dependability Requirements and Security Architectures for the Healthcare/Medical Sector / G. Trouessin
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature / S.-M. Lee ; T.-Y. Kim
The Integration of Safety and Security Requirements / D. P. Eames ; J. Moffett
Author Index
Invited Talk
Software Reliability Engineering in Industry / J. D. Musa
Assessment and Certification
10.

図書

図書
Bruce Christianson ... [et al.](eds.)
出版情報: Berlin : Springer, c2000  xii, 227 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1796
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼