Safety of computer control systems, 1990 (SAFECOMP '90) : safety, security, and reliability related computers for the 1990s : proceedings of the IFAC/EWICS/SARS Symposium, Gatwick, UK, 30 October-2 November 1990 /
The market for safe, secure and reliable computer systems is expanding continuously and these Proceedings provide an opportunity to review the growth during the last decade and identify skills and technologies required for continued development in the area. The papers cover the experiences gained fr...
Clasificación: | Libro Electrónico |
---|---|
Autores Corporativos: | , , , |
Otros Autores: | |
Formato: | Electrónico Congresos, conferencias eBook |
Idioma: | Inglés |
Publicado: |
Oxford, England :
Published for the International Federation of Automatic Control by Pergamon Press,
1990.
|
Edición: | First edition. |
Colección: | IFAC symposia series ;
1990, no. 17. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; Safety of Computer Control Systems 1990 (SAFECOMP'90): Safety, Security and Reliability Related Computers; Copyright Page; PREFACE; Table of Contents; Part 1: MATHEMATICAL FORMALISMS; Chapter 1. A FORMAL MODEL FOR SAFETY-CRITICAL COMPUTING SYSTEMS; 1. INTRODUCTION; 2. DEVELOPMENT MODEL; 3. SPECIFICATION MODEL; 4. EXAMPLE SYSTEM; 5. SUMMARY AND CONCLUSIONS; Chapter 2. FORMAL APPROACH TO FAULTS IN SAFETY RELATED APPLICATIONS; INTRODUCTION; HIERERCHICAL VERIFICATION; FORMALIZATION OF FAULTY BEHAVIOURS; EXAMPLE; CONCLUSIONS; REFERENCES.
- Chapter 3. PROVABLY CORRECT SAFETY CRITICAL SOFTWARE1 Introduction; 2 Requirements Capture; 3 Program Specification; 4 Program Development; 5 The compiler; 6 Program dependability; 7 ProCoS and the draft 00-55; 8 Summary; Acknowledgements; References; Part 2: CORRECTNESS; Chapter 4. ASPECTS OF PROVING COMPILER CORRECTNESS; 1 Introduction; 2 Syntax; 3 Transition Rules for Simple; 4 The Transition system for AL; 5 Transition Rules for TAL; 6 Block Structured Sequences; 7 Wellformedness; 8 Translating TAL into AL; 9 Computing the Program Remainder; 10 Moving the instruction pointer.
- 11 The Equivalence Theorem12 Conclusions; References; Chapter 5. A CONCEPT OF A COMPUTER SYSTEM FOR THE EXECUTION OF SAFETY CRITICAL LICENSABLE SOFTWARE PROGRAMMED IN A HIGH LEVEL LANGUAGE; INTRODUCTION; SOFTWARE DEVELOPMENT FOR PROGRAMMABLE LOGIC CONTROLLERS; SEQUENTIAL FUNCTION CHARTS; THE SYSTEM CONCEPT; IMPLEMENTATION DETAILS; PROGRAMMING ENVIRONMENT; CONCLUSION; REFERENCES; Chapter 6. MODELING AND VERIFYING SYSTEMS AND SOFTWARE IN PROPOSITIONAL LOGIC; I. BOOLEAN MODELLING OF SYSTEMS; II. A NEW METHOD FOR ANALYZING PROPOSITIONAL FORMULAS; CONCLUSION; REFERENCES.
- Chapter 7. LOGICAL FOUNDATIONS OF A PROBABILISTIC THEORY OF SOFTWARE CORRECTNESSINTRODUCTION; LOGICAL PROBABILITY; FOUNDATIONS OF SOFTWARE DEPENDABILITY; SOFTWARE REDUNDANCY; FAILURE PROBABILITY OF l-OUT-OF-2 SYSTEMS; PROBABILITY OF CORRECTNESS: REDUNDANT SYSTEMS; PROGRAMMING EXPERIMENTS AND URN MODELS; REFERENCES; Part 3: ISSUES OF SECURITY; Chapter 8. METHODS OF PROTECTION AGAINST COMPUTER VIRUSES; 1 INTRODUCTION; 2 DEFINITION OF A COMPUTER VIRUS; 3 BASIC FUNCTIONAL BLOCKS OF A COMPUTER VIRUS; 4 CLASSIFICATION OF COMPUTER VIRUSES; 5 METHODS OF PROTECTION AGAINST VIRUSES.
- 6 FIGHTING AGAINST VIRUSES UNDER PC DOS7 VIRUS RESISTANCE AT THE OPERATING SYSTEM LEVEL; 8 PASSIVE PROTECTION; 9 ACTIVE PROTECTION; 10 CONCLUSIONS; Acknowledgements; References; Chapter 9. THE NEED FOR A STANDARD METHOD FOR COMPUTER SECURITY REQUIREMENTS ANALYSIS; INTRODUCTION; PROBLEMS WITH REQUIREMENTS DEFINITION; STANDARDS AND CASELAW
- A METHOD FOR SECURITY REQUIREMENTS ANALYSIS; THE NEED FOR SECURITY REQUIREMENTS ANALYSTS; SUMMARY AND CONCLUSIONS; REFERENCES; Chapter 10. THE TESTING OF REAL-TIME EMBEDDED SOFTWARE BY DYNAMIC ANALYSIS TECHNIQUES; INTRODUCTION; DYNAMIC ANALYSIS.