|
Tuesday, 16 October 2012
Keynote Address
System Safety – A Glimpse into the Future
Warren Naylor, Lead System Safety Engineer, Electronic Systems, Northrop Grumman, USA
|
Session 1a: It a bit of an Argument
|
Session 1b: Cyber/Security
Infrastructures
|
1.a.1
Unplugged perils, lost hazards and failed mitigations
N Barton, RPS Group, UK, A J Rae,
University of York, UK |
1.b.1
A practical proposal for ensuring the provenance of hardware devices and their safe operation
Y Kovalchuk, H Hu, D Gu
K D McDonald-Maier, University of Essex,
UK, W G J Howells, University of Kent, UK |
1.a.2
ISO 26262 concept phase safety argument for a complex item
I Ibarra, S Hartley, S Crozier
D Ward, MIRA Ltd, UK |
1.b.2
What does the assurance case approach deliver for critical information infrastructure protection in cyber security?
A C Goodger, N H M Caldwell, J T Knowles
University of Cambridge, UK |
1.a.3
Evidence-based development - coupling structured argumentation with requirements development
A J J Dick, Integrate Systems Engineering,
UK |
1.b.3
Preparing for cyber-attacks on air traffic management infrastructures: Cyber-safety scenario generation
C W Johnson, University of Glasgow, UK |
1.a.4
Towards understanding the DO-178C / ED-12C assurance case
C M Holloway, NASA Langley Research
Center, USA |
1.b.4
Cost effective assessment of the infrastructure security posture
G P Williams, IT Governance Ltd, UK |
Keynote Address
Professor Peter Bernard Ladkin, University of Bielefeld CITEC and Causalis Ltd, Germany
|
Session 2a: Software Safety -
Architectures
|
Session 2b: Safety and Security |
2.a.1
Analysis and optimisation of mixed-criticality applications on partitioned distributed architectures
D Tamas-Selicean,S O Marinescu, P Pop
Technical University of Denmark, Denmark |
2.b.1
Generic security cases for information system security in healthcare systems
Y He, C W Johnson, University of Glasgow,
UK |
2.a.2
Capitalise on complexity
N Mc Guire, M Kreidl, OpenTech EDV
Research GmbH, Austria
S Cheng, Beijing Shenzhou Aerospace
Software Technology Co., Ltd, China |
2.b.2
On the relationship of hazards and threats in railway signalling
J Braband, M Seemann, Siemens AG,
Germany |
2.a.3
Applying failure mode modular de-composition (FMMD) across the software/hardware interface
R Clark, Energy Technology Control, UK,
A Fish, C Garret, J Howse, Univeristy of Brighton, UK |
2.b.3 - Poster
Assessing and improving software quality in safety critical systems bythe application of a software test maturity model
F I Duncan, A G Smeaton, BitWise Ltd, UK |
Session 3a: Functional
Safety
|
Session 3b: Safety and
Security
|
Session 3c: Accident
Assessment
|
3.a.1
Failure modes and effect analysis (FMEA) and model-checking of software for embedded systems by sequential scheduling of vectors of logic-labelled finite-state machines
V Estivill-Castro, R Hexel,
Griffith University, Australia
D A Rosemblueth,
Universidad Nacional
Autonoma de Mexico,
Mexico |
3.a.1
Security in integrated vetronics: Applying elliptic curve digital signature algorithm to a safety-critical network protocol – TTP/C
A Deshpande, O Obi
E Stipidis, P Charchalakis
University of Brighton, UK |
3.c.1
Comparing the identification of recommendations by different accident investigators using a common methodology
C W Johnson, University of Glasgow, UK, H A Oltedal, Stord/Haugesund University College, Norway,
C M
Holloway, NASA Langley
Research Center, USA
|
3.a.2
Combined safety and security certification
G Romanski, Verocel, Inc.,
USA |
3.b.2
The application of data diodes for securely connecting nuclear power plant safety systems to the corporate IT network
R T Barker, C J Cheese
EDF Energy, UK |
3.c.2
Analysis and modelling of space shuttle challenger accident using management oversight and risk tree (MORT)
S K Appicharla |
3.a.3 - Poster
"You don't know Jack" - Using 3D anthropometric modelling techniques to identify, assess and aid the early resolution of safety issues relating to military vehicle design
G Hudson, D Barker,
J H Barton,
D G B Varney,Atkins Defence, UK |
3.b.3
A holistic approach to trustworthy software
I Bryant, SSDRI, UK
|
3.c.3
Towards parsimonious resource allocation in context-aware N-version programming
J Buys, V De Florio,
C Blondia University of
Antwerp, Belgium |
Poster Presentation
Ensuring supplier safety analysis is not performed in isolation! The gulf between the project safety engineer and the front line user
N B Durston, HP Enterprise Defence and Security Services Ltd, UK
|
|