7th IET International Conference on System Safety, incorporating the Cyber Security Conference 2012

Buy conference proceeding
(plus tax if applicable)
  • Location: Edinburgh, UK
  • Conference date: 15-18 Oct. 2012
  • ISBN: 978-1-84919-678-9
  • Conference number: CP607
  • The following topics are dealt with: system safety; cyber security; security infrastructure; software safety; functional safety; accident assessment; system cyber assessment; governance; and incident assessment.

1 - 20 of 36 items found

  • Ensuring supplier safety analysis is not performed in isolation! The gulf between the Project Safety Engineer and the Front Line User
  • Unplugged perils, lost hazards and failed mitigations
  • A practical proposal for ensuring the provenance of hardware devices and their safe operation
  • ISO 26262 concept phase safety argument for a complex item
  • What does the assurance case approach deliver for critical information infrastructure protection in cybersecurity?
  • Evidence-based development - coupling structured argumentation with requirements development
  • Preparing for cyber-attacks on air traffic management infrastructures: cyber-safety scenario generation
  • Towards understanding the DO-178C / ED-12C assurance case
  • Cost effective assessment of the infrastructure security posture
  • Analysis and optimization of mixed-criticality applications on partitioned distributed architectures
  • Generic security cases for information system security in healthcare systems
  • Capitalize on complexity
  • On the relationship of hazards and threats in railway signaling
  • Applying Failure Mode Modular De-Composition (FMMD) across the software/hardware interface
  • Assessing and improving software quality in safety critical systems by the application of a software test maturity model
  • Failure mode and effects analysis (FMEA) and model-checking of software for embedded systems by sequential scheduling of vectors of logic-labelled finite-state machines
  • Security in integrated vetronics: applying elliptic curve digital signature algorithm to a safety-critical network protocol-TTP/C
  • Comparing the identification of recommendations by different accident investigators using a common methodology
  • Combined safety and security certification
  • The application of data diodes for securely connecting nuclear power plant safety systems to the corporate it network
1 2 | Next >
Items per page 20 | 50 | 100
This is a required field
Please enter a valid email address