


default search action
36th SAFECOMP Workshops 2017: Trento, Italy
- Stefano Tonetta, Erwin Schoitsch, Friedemann Bitsch:

Computer Safety, Reliability, and Security - SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings. Lecture Notes in Computer Science 10489, Springer 2017, ISBN 978-3-319-66283-1
5th International Workshop on Assurance Cases for Software-Intensive Systems (ASSURE 2017)
- Simon Burton, Lydia Gauerhof

, Christian Heinzemann:
Making the Case for Safety of Machine Learning in Highly Automated Driving. 5-16 - Shuji Kinoshita, Yoshiki Kinoshita:

A Thought Experiment on Evolution of Assurance Cases - - from a Logical Aspect. 17-26 - Robin Bloomfield, Peter G. Bishop

, Eoin Butler, Kateryna Netkachova:
Using an Assurance Case Framework to Develop Security Strategy and Policies. 27-28 - Andrzej Wardzinski, Paul L. Jones:

Uniform Model Interface for Assurance Case Integration with System Models. 39-51 - Carmen Cârlan, Simon Barner, Alexander Diewald, Alexandros Tsalidis, Sebastian Voss:

ExplicitCase: Integrated Model-Based Development of System and Safety Cases. 52-63 - Yutaka Matsuno:

D-Case Communicator: A Web Based GSN Editor for Multiple Stakeholders. 64-69 - Daniel Patrick Pereira, Celso M. Hirata

, Rodrigo Pagliares, Simin Nadjm-Tehrani:
Towards Combined Safety and Security Constraints Analysis. 70-80 - Abdullah Altawairqi, Manuel Maarek

:
Attack Modeling for System Security Analysis - (Position Paper). 81-86 - William G. Temple, Yue Wu, Binbin Chen

, Zbigniew Kalbarczyk:
Reconciling Systems-Theoretic and Component-Centric Methods for Safety and Security Co-analysis. 87-93
12th International ERCIM/EWICS/ARTEMIS Workshop on Dependable Smart Embedded Cyber-Physical Systems and Systems-of-Systems (DECSoS 2017)
- Loui Al Sardy

, Tong Tang, Marc Spisländer, Francesca Saglietti:
Analysis of Potential Code Vulnerabilities Involving Overlapping Instructions. 103-113 - Miren Illarramendi Rezabal

, Leire Etxeberria
, Xabier Elkorobarrutia
, Goiuria Sagardui
:
Increasing Dependability in Safety Critical CPSs Using Reflective Statecharts. 114-126 - Haris Isakovic, Radu Grosu, Denise Ratasich, Jiri Kadlec, Zdenek Pohl, Steve Kerrison

, Kyriakos Georgiou
, Kerstin Eder
, Norbert Druml, Lillian Tadros, Flemming Christensen, Emilie Wheatley, Bastian Farkas, Rolf Meyer, Mladen Berekovic
:
A Survey of Hardware Technologies for Mixed-Critical Integration Explored in the Project EMC^2. 127-140 - Pasquale Antonante, Juan Valverde-Alcalá, Stylianos Basagiannis

, Marco Di Natale:
Safe Implementation of Mixed-Criticality Applications in Multicore Platforms: A Model-Based Design Approach. 141-156 - Carlos Fernando Nicolás

, Fernando Eizaguirre, Asier Larrucea, Simon Barner, Franck Chauvel, Goiuria Sagardui
, Jon Pérez
:
GSN Support of Mixed-Criticality Systems Certification. 157-172 - Ferdinand von Tüllenburg, Thomas Pfeiffenberger:

Concepts for Reliable Communication in a Software-Defined Network Architecture. 173-186 - Sándor Plósz, Christoph Schmittner, Pál Varga:

Combining Safety and Security Analysis for Industrial Collaborative Automation Systems. 187-198 - Imanol Mugarza, Jorge Parra

, Eduardo Jacob
:
Software Updates in Safety and Security Co-engineering. 199-210 - Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida:

Detailed Analysis of Security Evaluation of Automotive Systems Based on JASO TP15002. 211-224 - Sebastian Müller, Peter Liggesmeyer:

Systematic Composition of Services from Distributed Systems for Highly Dynamic Collaboration Processes. 225-236 - Fábio Luiz Leite Jr.

, Rasmus Adler, Patrik Feth:
Safety Assurance for Autonomous and Collaborative Medical Cyber-Physical Systems. 237-248 - Amin Majd, Elena Troubitsyna, Masoud Daneshtalab

:
Safety-Aware Control of Swarms of Drones. 249-260
6th International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems (SASSUR 2017)
- Jose Luis de la Vara

, Álvaro Gómez, Elena Gallego, Gonzalo Génova, Anabel Fraga
:
Representation of Safety Standards with Semantic Technologies Used in Industrial Environments. 265-272 - Georg Macher

, Alexander Much, Andreas Riel
, Richard Messnarz
, Christian Kreiner
:
Automotive SPICE, Safety and Cybersecurity Integration. 273-285 - Helmut Martin, Robert Bramberger, Christoph Schmittner, Zhendong Ma, Thomas Gruber, Alejandra Ruiz, Georg Macher

:
Safety and Security Co-engineering and Argumentation Framework. 286-297 - Timo Varkoi, Risto Nevalainen:

Process Assessment in Supplier Selection for Safety-Critical Systems in Nuclear Domain. 298-308 - Nikita Bhardwaj, Peter Liggesmeyer:

A Runtime Risk Assessment Concept for Safe Reconfiguration in Open Adaptive Systems. 309-316 - Irfan Sljivo

, Barbara Gallina, Bernhard Kaiser:
Assuring Degradation Cascades of Car Platoons via Contracts. 317-329
3rd International Workshop on TEchnical and LEgal Aspects of Data pRIvacy and SEcurity (TELERISE 2017)
- Piero A. Bonatti, Sabrina Kirrane, Axel Polleres, Rigo Wenning:

Transparent Personal Data Processing: The Road Ahead. 337-349 - Aaron Ceross

, Andrew Simpson
:
The Use of Data Protection Regulatory Actions as a Data Source for Privacy Economics. 350-360 - Silvio Ranise

, Hari Siswantoro
:
Automated Legal Compliance Checking by Security Policy Analysis. 361-372 - Antonello Calabrò

, Francesca Lonetti
, Eda Marchetti
:
Access Control Policy Coverage Assessment Through Monitoring. 373-383 - Giacomo Giorgi, Fabio Martinelli, Andrea Saracino

, Mina Sheikhalishahi:
Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep Learning. 384-395 - Marios Argyriou, Nicola Dragoni

, Angelo Spognardi
:
Security Flows in OAuth 2.0 Framework: A Case Study. 396-406 - Gabriele Costa

, Federico Sinigaglia, Roberto Carbone
:
PolEnA: Enforcing Fine-grained Permission Policies in Android. 407-414 - Roberto Pellungrini, Luca Pappalardo

, Francesca Pratesi
, Anna Monreale:
Fast Estimation of Privacy Risk in Human Mobility Data. 415-426 - Zhendong Ma, Walter Seböck

, Bettina Pospisil
, Christoph Schmittner, Thomas Gruber:
Security and Privacy in the Automotive Domain: A Technical and Social Analysis. 427-434 - Philipp Hehnle, Pascal Keilbach, Hyun-Jin Lee, Sabrina Lejn, Daniel Steidinger, Marina Weinbrenner, Hanno Langweg:

One Click Privacy for Online Social Networks. 435-442
2nd International Workshop on Timing Performance in Safety Engineering (TIPS 2017)
- Klaus Havelund, Rajeev Joshi:

Modeling Rover Communication Using Hierarchical State Machines with Scala. 447-461 - Mladen Skelin, Marc Geilen

:
Towards Component-Based (max, +) Algebraic Throughput Analysis of Hierarchical Synchronous Data Flow Models. 462-476

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














