Computer Safety, Reliability, and Security
25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings
Chapter
The chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC...
Article
Monitoring and repair are two sides of the on-the-fly maintenance of IT systems. Monitoring is well supported by automatic tools. In contrast, repairs involve much higher human intervention which negatively af...
Chapter and Conference Paper
The paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards....
Chapter and Conference Paper
The paper presents a case study aiming at collecting opinions of software engineers on the risks related to integration of agile practices to safety-critical software development projects. The study has been p...
Chapter and Conference Paper
The paper presents the concept and the mechanism of comparative conformance cases which support conformance monitoring in situations where a standard or other set of requirements are being implemented at multi...
Chapter and Conference Paper
Structured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is address...
Chapter and Conference Paper
The paper presents a mechanism for privacy management developed for a distributed environment with the assumption that the nodes are subjected to severe resource constraints (processing power, memory). The bas...
Chapter and Conference Paper
Effective methods for metrics definition are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-...
Chapter and Conference Paper
Argument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods o...
Book and Conference Proceedings
25th International Conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006. Proceedings
Book and Conference Proceedings
Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004
Chapter and Conference Paper
Object-oriented models are commonly used in software projects. They may be affected, however, by various defects introduced easily due to e.g. wrong understanding of modelled reality, making wrong assumptions ...
Chapter and Conference Paper
The paper presents the OF-APSAF integrated framework for authention protocol analysis. The framework is built on top of a well-established formal method CSP and its supporting tools: Casper and FDR. The integr...
Chapter and Conference Paper
The paper presents an approach to development of trust cases intended to justify and support claims about trustworthiness of IT enabled products and services. It introduces the conceptual framework of a trust ...
Chapter and Conference Paper
The paper introduces the notion of trust case and explains its meaning within the context of IT systems. It reports on the experiences gained during development of a trust case for a complex IT system for drugs d...
Chapter and Conference Paper
Objectively justified trust is becoming an issue that receives increasing attention as information technologies conquer new application domains and extend the scope of their applications. We introduce the noti...
Chapter and Conference Paper
The paper presents an extension to the common FMEA method in such a way that it can be applied to safety analysis of systems,(hardware and software) that are developed using a recently popular object oriented ...
Chapter and Conference Paper
The paper presents a concept of continuous risk management in distributed software development projects. The concept is particularly relevant for critical software applications where risk management is among m...
Chapter
The paper recognises the increasing role of risk management in present software projects and aims at providing more support in this area. First we overview the objectives and processes of risk management with ...
Chapter and Conference Paper
The paper presents how CSP and the associated tool FDR are used to support FMEA of a software intensive system. The paper explains the basic steps of our approach (formal specification, systematic fault identi...