Cargando…

Architecting Critical Systems First International Symposium, Prague, Czech Republic, June 23-25, 2010 /

Architecting critical systems has gained major importance in commercial, governmental, and industrial sectors. Emerging software applications encompass practicalities that are associated with either the whole system or some of its components. Therefore, effective methods, techniques, and tools for c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Giese, Holger (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6150
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-13556-9
003 DE-He213
005 20220115074607.0
007 cr nn 008mamaa
008 100605s2010 gw | s |||| 0|eng d
020 |a 9783642135569  |9 978-3-642-13556-9 
024 7 |a 10.1007/978-3-642-13556-9  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Architecting Critical Systems  |h [electronic resource] :  |b First International Symposium, Prague, Czech Republic, June 23-25, 2010 /  |c edited by Holger Giese. 
250 |a 1st ed. 2010. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2010. 
300 |a 205 p. 82 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 6150 
505 0 |a Design -- An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance -- Architectural Design Decisions for Achieving Reliable Software Systems -- Integrating Fault-Tolerant Techniques into the Design of Critical Systems -- Component Behavior Synthesis for Critical Systems, -- Verification and Validation -- A Road to a Formally Verified General-Purpose Operating System -- Engineering a Distributed e-Voting System Architecture: Meeting Critical Requirements -- Testing Fault Robustness of Model Predictive Control Algorithms -- Domain-Specific Results -- Towards Net-Centric Cyber Survivability for Ballistic Missile Defense -- A Safety Case Approach to Assuring Configurable Architectures of Safety-Critical Product Lines -- Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays -- Standards -- ISO/DIS 26262 in the Context of Electric and Electronic Architecture Modeling. 
520 |a Architecting critical systems has gained major importance in commercial, governmental, and industrial sectors. Emerging software applications encompass practicalities that are associated with either the whole system or some of its components. Therefore, effective methods, techniques, and tools for constructing, testing, analyzing, and evaluating the architectures for critical systems are of major importance. Furthermore, these methods, techniques, and tools must address issues of dependability and security, while focusing not only on the development, but also on the deployment and evolution of the architecture. This newly established ISARCS symposium provided an exclusive forum for exchanging views on the theory and practice for architecting critical systems. Such systems are characterized by the perceived severity of consequences that faults or attacks may cause, and architecting them requires appropriate means to assure that they will fulfill their specified services in a dependable and secure manner. The different attributes of dependability and security cannot be considered in isolation for today's critical systems, as architecting critical systems essentially means finding the right trade-off among these attributes and the various other requirements imposed on the system. This symposium therefore brought together the four communities working on dependability, safety, security, and testing/analysis, each addressing to some extent the architecting of critical systems from their specific perspective. To this end, the symposium united the following three former events: the Workshop on Architecting Dependable Systems (WADS); the Workshop on the Role of Software Architecture for Testing and Analysis (ROSATEA); and the Workshop on Views on Designing Complex Architectures. 
650 0 |a Computer networks . 
650 0 |a Computers, Special purpose. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Application software. 
650 0 |a Computers and civilization. 
650 0 |a Algorithms. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a Special Purpose and Application-Based Systems. 
650 2 4 |a Cryptology. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a Computers and Society. 
650 2 4 |a Algorithms. 
700 1 |a Giese, Holger.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642135552 
776 0 8 |i Printed edition:  |z 9783642135576 
830 0 |a Security and Cryptology ;  |v 6150 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-13556-9  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)