Computer safety, reliability, and security : 34th International Conference, SAFECOMP 2015, Delft, the Netherlands, September 23-25, 2015, Proceedings /: 34th International Conference, SAFECOMP 2015, Delft, the Netherlands, September 23-25, 2015, Proceedings. (2015)
- Record Type:
- Book
- Title:
- Computer safety, reliability, and security : 34th International Conference, SAFECOMP 2015, Delft, the Netherlands, September 23-25, 2015, Proceedings /: 34th International Conference, SAFECOMP 2015, Delft, the Netherlands, September 23-25, 2015, Proceedings. (2015)
- Main Title:
- Computer safety, reliability, and security : 34th International Conference, SAFECOMP 2015, Delft, the Netherlands, September 23-25, 2015, Proceedings
- Other Titles:
- SAFECOMP 2015
- Further Information:
- Note: Floor Koornneef, Coen van Gulijk (eds.).
- Editors:
- Koornneef, Floor, 1950-
Gulijk, Coen van - Other Names:
- SAFECOMP (Conference), 34th
- Contents:
- Intro; Preface; Organization; Invited Talks; Does IoT Stand for Internet of Threatsand Other Stories; Medical Devices, Electronic Health Recordsand Assuring Patient Safety:Future Challenges?; Cyber (In-)security of Industrial ControlSystems: A Societal Challenge; Contents; Invited Talks; Medical Devices, Electronic Health Records and Assuring Patient Safety: Future Challenges?; Abstract; 1 EHR Promises and Problems; 2 Connectivity and Medical Devices; 3 eHealth and Home Monitoring; 4 The Tension Between Patient Privacy and Patient Safety; 5 Conclusion; References Cyber (In-)security of Industrial Control Systems: A Societal Challenge1 Introduction; 2 Definitions; 3 Paradigm Changes to ICS; 3.1 From Closed to too Open Environments; 3.2 Hide in Functionality but Connected to Internet; 4 Lack of Governance of ICS Security; 4.1 The Executive Level; 5 ICS Technology; 5.1 Aging, Legacy and too New ICS Technology; 5.2 Weak and Insecure ICS Protocols; 5.3 Insecure ICS by Design; 5.4 Common TCP-IP Based Connectivity; 6 ICS Maintenance and Operations; 7 Third Parties; 8 Conclusion: Long and Short Term Actions; References; Flight Systems Modeling Guidelines and Usage Analysis Towards Applying HiP-HOPS Method to Airborne Electrical SystemsAbstract; 1 Introduction; 2 HiP-HOPS Foundations; 3 Modeling Guidelines to Apply HiP-HOPS; 3.1 Guideline 1: Create a Library of Annotated Components; 3.2 Guideline 2: Support Annotation Customization; 3.3 Guideline 3: Define the System's Modes ofIntro; Preface; Organization; Invited Talks; Does IoT Stand for Internet of Threatsand Other Stories; Medical Devices, Electronic Health Recordsand Assuring Patient Safety:Future Challenges?; Cyber (In-)security of Industrial ControlSystems: A Societal Challenge; Contents; Invited Talks; Medical Devices, Electronic Health Records and Assuring Patient Safety: Future Challenges?; Abstract; 1 EHR Promises and Problems; 2 Connectivity and Medical Devices; 3 eHealth and Home Monitoring; 4 The Tension Between Patient Privacy and Patient Safety; 5 Conclusion; References Cyber (In-)security of Industrial Control Systems: A Societal Challenge1 Introduction; 2 Definitions; 3 Paradigm Changes to ICS; 3.1 From Closed to too Open Environments; 3.2 Hide in Functionality but Connected to Internet; 4 Lack of Governance of ICS Security; 4.1 The Executive Level; 5 ICS Technology; 5.1 Aging, Legacy and too New ICS Technology; 5.2 Weak and Insecure ICS Protocols; 5.3 Insecure ICS by Design; 5.4 Common TCP-IP Based Connectivity; 6 ICS Maintenance and Operations; 7 Third Parties; 8 Conclusion: Long and Short Term Actions; References; Flight Systems Modeling Guidelines and Usage Analysis Towards Applying HiP-HOPS Method to Airborne Electrical SystemsAbstract; 1 Introduction; 2 HiP-HOPS Foundations; 3 Modeling Guidelines to Apply HiP-HOPS; 3.1 Guideline 1: Create a Library of Annotated Components; 3.2 Guideline 2: Support Annotation Customization; 3.3 Guideline 3: Define the System's Modes of Operation; 3.4 Guideline 4: Group Components by Its Function; 3.5 Guideline 5: Model Considering the Common Mode Effects; 3.6 Guideline 6: Avoid Loops; 3.7 Guideline 7: Design Models with Incremental Complexity 4 Usage Analysis of HiP-HOPS with Modeling Guidelines4.1 Scenario; 4.2 Evaluating Acceptability, Suitability and Practicality of HiP-HOPS; 5 Conclusions; References; The Formal Derivation of Mode Logic for Autonomous Satellite Flight Formation; 1 Introduction; 2 Satellite Flight Formation; 3 Coordinated Mode Transitions in Autonomous Systems; 4 Modelling and Refinement in Event-B; 5 Modelling Satellite Flight Formation in Event-B; 6 Conclusion and Related Work; References; Automotive Embedded Systems Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional TransitionsAbstract; 1 Motivation: The Role of Drivers in Automotive Safety/Security; 2 Basics; 2.1 Think-Aloud-Tests; 2.2 Driving Simulator; 3 Concept, Test Setup and Execution; 3.1 Emotional Transitions; 4 Test Evaluation; 4.1 Recommendation of Conduct and Understanding of the Warning; 4.2 Recommendation of Conduct and Quality of Reaction; 4.3 Self-perceived and Investigator-Perceived Quality of Reaction; 4.4 Warning Understood and Quality of Reaction; 4.5 Lane Change Test … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2015
- Extent:
- 1 online resource (xxii, 486 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer systems -- Reliability -- Congresses
Computer security
Computer systems -- Reliability
Computer Science
Engineering & Applied Sciences
Computer Science
Logics and Meanings of Programs
Programming Languages, Compilers, Interpreters
Software Engineering
Systems and Data Security
Computer Applications
Computer Systems Organization and Communication Networks
Computers -- Programming Languages -- General
Computers -- Software Development & Engineering -- General
Computers -- Security -- General
Computers -- Data Processing
Computers -- Hardware -- General
Programming & scripting languages: general
Software Engineering
Computer security
Information technology: general issues
Computer networking & communications
Logic design
Software engineering
Computer security
Computer network architectures
Computers -- Programming -- General
Computer programming / software development
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319242552
3319242555
3319242547
9783319242545 - Related ISBNs:
- 9783319242545
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed September 22, 2015).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.362524
- Ingest File:
- 01_330.xml