Papers
Day 1
Day 2
 


            

Tuesday, 16 October 2012

Keynote Address
System Safety – A Glimpse into the Future
Warren Naylor, Lead System Safety Engineer, Electronic Systems, Northrop Grumman, USA

Session 1a: It a bit of an Argument

Session 1b: Cyber/Security
Infrastructures

1.a.1
Unplugged perils, lost hazards and failed mitigations
N Barton, RPS Group, UK, A J Rae,
University of York, UK

1.b.1
A practical proposal for ensuring the provenance of hardware devices and their safe operation

Y Kovalchuk, H Hu, D Gu
K D McDonald-Maier, University of Essex,
UK, W G J Howells, University of Kent, UK

1.a.2
ISO 26262 concept phase safety argument for a complex item
I Ibarra, S Hartley, S Crozier
D Ward, MIRA Ltd, UK

1.b.2
What does the assurance case approach deliver for critical information infrastructure protection in cyber security?
A C Goodger, N H M Caldwell, J T Knowles
University of Cambridge, UK

1.a.3
Evidence-based development - coupling structured argumentation with requirements development

A J J Dick, Integrate Systems Engineering,
UK

1.b.3
Preparing for cyber-attacks on air traffic management infrastructures: Cyber-safety scenario generation
C W Johnson, University of Glasgow, UK

1.a.4
Towards understanding the DO-178C / ED-12C assurance case

C M Holloway, NASA Langley Research
Center, USA

1.b.4
Cost effective assessment of the infrastructure security posture
G P Williams, IT Governance Ltd, UK


Keynote Address
Professor Peter Bernard Ladkin, University of Bielefeld CITEC and Causalis Ltd, Germany

Session 2a: Software Safety -
Architectures

Session 2b: Safety and Security

2.a.1
Analysis and optimisation of mixed-criticality applications on partitioned distributed architectures
D Tamas-Selicean,S O Marinescu, P Pop   
Technical University of Denmark, Denmark

2.b.1
Generic security cases for information system security in healthcare systems

Y He, C W Johnson, University of Glasgow,
UK

2.a.2
Capitalise on complexity

N Mc Guire, M Kreidl, OpenTech EDV
Research GmbH, Austria
S Cheng, Beijing Shenzhou Aerospace
Software Technology Co., Ltd, China

2.b.2
On the relationship of hazards and threats in railway signalling
J Braband, M Seemann, Siemens AG,
Germany

2.a.3
Applying failure mode modular de-composition (FMMD) across the software/hardware interface
R Clark, Energy Technology Control, UK,
A Fish, C Garret, J Howse, Univeristy of Brighton, UK

2.b.3 - Poster
Assessing and improving software quality in safety critical systems bythe application of a software test maturity model
F I Duncan, A G Smeaton, BitWise Ltd, UK


Session 3a: Functional
Safety 

Session 3b: Safety and
Security

Session 3c: Accident
Assessment

3.a.1
Failure modes and effect analysis (FMEA) and model-checking of software for embedded systems by sequential scheduling of vectors of logic-labelled finite-state machines

V Estivill-Castro, R Hexel,
Griffith University, Australia
D A Rosemblueth,
Universidad Nacional
Autonoma de Mexico,
Mexico

3.a.1
Security
in integrated vetronics: Applying elliptic curve digital signature algorithm to a safety-critical network protocol – TTP/C

A Deshpande, O Obi
E Stipidis, P Charchalakis
University of Brighton, UK

3.c.1
Comparing the identification of recommendations by different accident investigators using a common methodology

C W Johnson, University of Glasgow, UK, H A Oltedal, Stord/Haugesund University College, Norway, C M
Holloway, NASA Langley
Research Center, USA

3.a.2  
Combined safety and security certification

G Romanski, Verocel, Inc.,
USA

3.b.2
The application of data diodes for securely connecting nuclear power plant safety systems to the corporate IT network

R T Barker, C J Cheese
EDF Energy, UK

3.c.2
Analysis and modelling of space shuttle challenger accident using management oversight and risk tree (MORT)
S K Appicharla

3.a.3 - Poster
"You don't know Jack" - Using 3D anthropometric modelling techniques to identify, assess and aid the early resolution of safety issues relating to military vehicle design
G Hudson, D Barker,
J H Barton,
D G B Varney,Atkins Defence, UK

3.b.3
A holistic approach to trustworthy software

I Bryant, SSDRI, UK

 

3.c.3  
Towards parsimonious resource allocation in context-aware N-version programming
J Buys, V De Florio,
C Blondia University of
Antwerp, Belgium


Poster Presentation
Ensuring supplier safety analysis is not performed in isolation!  The gulf between the project safety engineer and the front line user
N B Durston,  HP Enterprise Defence and Security Services Ltd, UK

 
© 2012 The Institution of Engineering and Technology
The Institution of Engineering and Technology is registered as a Charity in England & Wales (no 211014) and Scotland (no SC038698)
The IET logo link