Computer safety, reliability, and security : SAFECOMP 2015 Workshops, ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, the Netherlands, September 22, 2015, Proceedings /: SAFECOMP 2015 Workshops, ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, the Netherlands, September 22, 2015, Proceedings. (2015)
- Record Type:
- Book
- Title:
- Computer safety, reliability, and security : SAFECOMP 2015 Workshops, ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, the Netherlands, September 22, 2015, Proceedings /: SAFECOMP 2015 Workshops, ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, the Netherlands, September 22, 2015, Proceedings. (2015)
- Main Title:
- Computer safety, reliability, and security : SAFECOMP 2015 Workshops, ASSURE, DECSoS, ISSE, ReSA4CI, and SASSUR, Delft, the Netherlands, September 22, 2015, Proceedings
- Other Titles:
- SAFECOMP 2015
- Further Information:
- Note: Floor Koornneef, Coen van Gulijk (eds.).
- Editors:
- Koornneef, Floor, 1950-
Gulijk, Coen van - Other Names:
- SAFECOMP (Conference), 34th
ASSURE (Workshop), 3rd
DECSoS (Workshop), 2nd
ISSE (Workshop), 2nd
ReSA4CI (Workshop), 2nd
SASSUR (Workshop), 3rd - Contents:
- Intro; Preface; Organizing Committee; ASSURE 2015; The 3rd International Workshop on AssuranceCases for Software-Intensive Systems; DECSoS 2015; Introduction ERCIM/EWICS/ARTEMISWorkshop on Dependable Embeddedand Cyber-Physical Systemsand Systems-of-Systems at SAFECOMP 2015; ISSE 2015; 2nd International Workshop on the Integrationof Safety and Security Engineering; ReSA4CI 2015; Introduction to the Safecomp 2015 Workshop:Reliability and Security Aspectsfor Critical Infrastructure Protection; SASSUR 2015 4th InternationalWorkshop on NextGenerationof System Assurance Approachesfor Safety-Critical SystemsSponsors; Conference Partners; Contents; Assurance Cases for Software-Intensive Systems (ASSURE 2015); Informing Assurance Case Review Through a Formal Interpretation of GSN Core Logic; 1 Introduction; 2 Formalization in Assurance Argumentation; 3 Fundamental GSN Elements and Notions; 4 Semantics; 5 Argument Consistency; 6 Conclusions; References; Representing Confidence in Assurance Case Evidence; 1 Introduction; 2 Background and Related Work; 3 Application to Assurance Cases; 3.1 Node Example 3.2 Assurance Example4 Conclusions; References; Safe & Sec Case Patterns; 1 Introduction; 2 Safe & Sec Process Patterns; 2.1 Subordinate Process Pattern; 2.2 Uni-Directional Reference Process Pattern; 2.3 Interrelated (Independent) Process Pattern; 2.4 Interrelated (SafSec) Process Pattern; 3 Safe & Sec Case Patterns; 3.1 Independent Case Pattern; 3.2 Subordinate Case Pattern; 3.3Intro; Preface; Organizing Committee; ASSURE 2015; The 3rd International Workshop on AssuranceCases for Software-Intensive Systems; DECSoS 2015; Introduction ERCIM/EWICS/ARTEMISWorkshop on Dependable Embeddedand Cyber-Physical Systemsand Systems-of-Systems at SAFECOMP 2015; ISSE 2015; 2nd International Workshop on the Integrationof Safety and Security Engineering; ReSA4CI 2015; Introduction to the Safecomp 2015 Workshop:Reliability and Security Aspectsfor Critical Infrastructure Protection; SASSUR 2015 4th InternationalWorkshop on NextGenerationof System Assurance Approachesfor Safety-Critical SystemsSponsors; Conference Partners; Contents; Assurance Cases for Software-Intensive Systems (ASSURE 2015); Informing Assurance Case Review Through a Formal Interpretation of GSN Core Logic; 1 Introduction; 2 Formalization in Assurance Argumentation; 3 Fundamental GSN Elements and Notions; 4 Semantics; 5 Argument Consistency; 6 Conclusions; References; Representing Confidence in Assurance Case Evidence; 1 Introduction; 2 Background and Related Work; 3 Application to Assurance Cases; 3.1 Node Example 3.2 Assurance Example4 Conclusions; References; Safe & Sec Case Patterns; 1 Introduction; 2 Safe & Sec Process Patterns; 2.1 Subordinate Process Pattern; 2.2 Uni-Directional Reference Process Pattern; 2.3 Interrelated (Independent) Process Pattern; 2.4 Interrelated (SafSec) Process Pattern; 3 Safe & Sec Case Patterns; 3.1 Independent Case Pattern; 3.2 Subordinate Case Pattern; 3.3 Uni-Directional Reference Case Pattern; 3.4 Interrelated (Independent) Case Pattern; 3.5 Interrelated (SafSec) Case Pattern; 4 Related Work; 5 Conclusion; References; A Comprehensive Safety Lifecycle; Abstract 1 Introduction2 CLASS Principles; 3 The CLASS Meta Process; 3.1 Development Component; 3.2 Update Component; 4 The CLASS Instance Process; 4.1 InstanceCLASS Information Flow; 4.2 Safety Information Repository; 5 The CLASS Resource Repository; 6 The CLASS Analysis Framework; 7 The CLASS Approval Process; 8 Conclusion; Acknowledgments; References; An Approach to Assure Dependability Through ArchiMate; Abstract; 1 Introduction; 2 Related Work; 2.1 Assurance Case; 2.2 Open Dependability Through Assuredness; 2.3 Assured ADM; 2.4 ArchiMate; 3 Assurance Case Patterns for Architecture 3.1 Dependability Argument and ArchiMate3.2 Assurance Case Derivation from ArchiMate Model; 4 Example Study; 4.1 Driving Diagnosis Service; 4.2 BA in ArchiMate; 5 Discussion; 5.1 Effectiveness; 5.2 Applicability; 5.3 Generality; 5.4 Limitations; 6 Conclusion; Acknowledgment; References; Tool Support for Assurance Case Building Blocks; Abstract; 1 Introduction; 2 CAE Building Blocks and the "Helping Hand"; 2.1 Building Blocks Concept; 2.2 "Helping Hand" for CAE Building Blocks; 3 Tool Description; 3.1 Tool Support for CAE Building Blocks; 3.2 Integration with ASCE … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2015
- Extent:
- 1 online resource (xvi, 425 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer systems -- Reliability -- Congresses
Computer security
Computer systems -- Reliability
Computer Science
Engineering & Applied Sciences
Computer Science
Logics and Meanings of Programs
Software Engineering
Systems and Data Security
Computer Systems Organization and Communication Networks
Computers -- Software Development & Engineering -- General
Computers -- Security -- General
Computers -- Hardware -- General
Software Engineering
Computer security
Computer networking & communications
Logic design
Software engineering
Computer security
Computer network architectures
Computers -- Programming -- General
Computer programming / software development
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319242491
3319242490
3319242482
9783319242484 - Related ISBNs:
- 9783319242484
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed September 17, 2015).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.362508
- Ingest File:
- 01_328.xml