计算机安全、可靠性与保密: SAFECOMP 2006/会议录LNCS-4166: Computer safety, reliability, and security
![计算机安全、可靠性与保密: SAFECOMP 2006/会议录LNCS-4166: Computer safety, reliability, and security](http://image.wangchao.net.cn/small/product/1236125897312.jpg)
分類: 图书,计算机/网络,信息安全,
作者: Janusz Górski著
出 版 社: 湖南文艺出版社
出版时间: 2006-12-1字数:版次: 1页数: 438印刷时间: 2006/12/01开本:印次:纸张: 胶版纸I S B N : 9783540457626包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science resarch forum available.
The scope of LNCS, including its subseries LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material publised traditionally includes.
-proceedings(published in time for the respective conference)
-post-proceedings(consisting of thoroughly revised final full papers)
-research monographs(which may be basde on outstanding PhD work, research projects, technical reports, etc.)
内容简介
This book constitutes the refereed proceedings of the 25th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2006, held in Gdansk, Poland, in September 2006.
The 32 revised full papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on systems of systems, security and survivability analysis, nuclear safety and application of standards, formal approaches, networks dependability, coping with change and mobility, safety analysis and assessment, 6th FP integrated project DECOS, and modelling.
目录
Systems of Systems
System of Systems Hazard Analysis Using Simulation and MachineLearning
Through the Description of Attacks: A Multidimensional View
On Certain Behavior of Scale-Free Networks Under MaliciousAttacks
Security and Survivability Analysis
Verifying a Chipcard-Based Biometric Identification Protocol in VSE
Exploring Resilience Towards Risks in eOperations in the Oil and GasIndustry
Computer System Survivability Modelling by Using Stochastic ActivityNetwork
Nuclear Safety and Application of Standards
Software Safety Lifecycles and the Methods of a ProgrammableElectronic Safety System for a Nuclear Power Plant
Regulatory Software Configuration Management System Design
Gaining Confidence in the Software Development Process Using ExpertSystems
Formal Approaches
Retrenchment, and the Generation of Fault Trees for Static, Dynamicand Cyclic Systems
Stepwise Development of Secure Systems
Component-Based Hazard Analysis: Optimal Designs, Product Lines,and Online-Reconfiguration
Networks Dependability
New VoIP Traffic Security Scheme with Digital Watermarking
Towards Filtering and Alerting Rule Rewriting on Single-ComponentPolicies
Using Group Overlapping to Protect Server from Attack in GridComputing
Coping with Change and Mobility
The Role of Situation Awareness in Assuring Safety of AutonomousVehicles
Demonstration of Safety in Healthcare Organisations
Healthcare System Architecture, Economic Value, and Policy Modelsin Large-Scale Wireless Sensor Networks
Safety Analysis and Assessment
Poster Session
6th FP Integrated Projeet DECOS
Modelling
Author Index