327 lines
21 KiB
HTML
327 lines
21 KiB
HTML
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
|
|
"http://www.w3.org/TR/html4/loose.dtd">
|
|
<html>
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
|
|
|
|
<title>Programme :: System Safety | IET</title>
|
|
<link href="css/styles.css" rel="stylesheet" type="text/css">
|
|
<style type="text/css">
|
|
<!--
|
|
a:link {
|
|
text-decoration: none;
|
|
}
|
|
a:visited {
|
|
text-decoration: none;
|
|
}
|
|
a:hover {
|
|
text-decoration: underline;
|
|
}
|
|
a:active {
|
|
text-decoration: none;
|
|
}
|
|
body {
|
|
background-color: #e5e8ea;
|
|
}
|
|
|
|
.prognavigation1 {
|
|
font-family: Arial, Helvetica, sans-serif;
|
|
font-size: 12px;
|
|
color: #ffffff;
|
|
font-weight:bold;
|
|
padding-left: 5px;
|
|
padding-right:5px;
|
|
}
|
|
.prognavigation2 {
|
|
font-family: Arial, Helvetica, sans-serif;
|
|
font-size: 12px;
|
|
color: #000000;
|
|
padding-left: 5px;
|
|
padding-right:5px;
|
|
}
|
|
.style3 {font-size: 16px}
|
|
.table-programme {
|
|
width:520px;
|
|
border:1px solid #dae3ee;
|
|
margin:0px;
|
|
margin-left:5px;
|
|
background:#fefefe;
|
|
border-collapse:collapse;
|
|
}
|
|
|
|
.table-programme td {
|
|
border:1px solid #dae3ee;
|
|
padding:8px;
|
|
font-size: 12px;
|
|
}
|
|
|
|
.table-programme ul {
|
|
text-align: left;
|
|
padding-left: 10px;
|
|
padding-top: 0px;
|
|
padding-right:0px;
|
|
}
|
|
|
|
-->
|
|
</style>
|
|
</head>
|
|
|
|
<body>
|
|
<div align="center">
|
|
<table width="760" border="0" cellpadding="0" cellspacing="0" class="fourlines">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="760" height="150" valign="top"><img src="images/header.jpg" width="760" height="150" border="0" usemap="#Map"></td>
|
|
</tr>
|
|
<tr>
|
|
<td height="40" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0" class="nav_bg">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="760" height="40" align="left" valign="middle" class="whitetextindent10"><a href="index.htm" class="whitetextindent10">Welcome</a> | <a href="about.htm" class="whitetextindent10">About this CD-ROM</a> | <a href="presentations.htm" class="whitetextindent10">Papers</a> | <a href="authors.htm" class="whitetextindent10">Author List</a> | <a href="join.htm" class="whitetextindent10">Join the IET </a> | <a href="contactus.htm" class="whitetextindent10">Contact us</a></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
<tr>
|
|
<td height="385" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0" bgcolor="#FFFFFF">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td height="10" colspan="5" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="760" height="10"></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="10" rowspan="3" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="10" height="375"> </td>
|
|
</tr>
|
|
</table></td>
|
|
<td height="28" colspan="3" align="left" valign="top" class="titletext"><table width="100%" border="0" cellspacing="0" cellpadding="0">
|
|
<tr>
|
|
<td width="440" height="28" valign="middle"><div align="left"><strong>Papers</strong></div></td>
|
|
<td width="67" align="center" bgcolor="#000000"><a href="day1.htm" class="prognavigation1">Day 1</a></td>
|
|
<td width="8"><div align="center"></div></td>
|
|
<td width="67" align="center" bgcolor="#e6e7ea"><a href="day2.htm" class="prognavigation2">Day 2</a></td>
|
|
<td width="8"><div align="center"></div></td>
|
|
<td width="15"> </td>
|
|
<td width="21"><div align="center"></div></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="186" height="379" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="186" height="394" valign="top"><img src="images/content_mft.jpg" width="186" height="394"></td>
|
|
</tr> </table></td>
|
|
<td width="536" align="left" valign="top" class="blacktext11">
|
|
<p><br>
|
|
<br/>
|
|
</p>
|
|
<h2 align="left"><strong>Tuesday, 16 October 2012</strong></h2>
|
|
<table border="1" align="left" cellpadding="0" cellspacing="0" class="table-programme">
|
|
<tr>
|
|
<td colspan="2" valign="top"><p><span class="blacktext11"><strong>Keynote Address </strong> <br>
|
|
<strong>System Safety – A Glimpse into the Future</strong><br>
|
|
<a href="biographies/warrennaylor.pdf" target="_blank" class="gen1">Warren Naylor</a>, Lead System Safety Engineer, <em>Electronic Systems, Northrop Grumman, USA</em></span><br>
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="257" valign="top"><p><strong class="blacktext11">Session 1a: It a bit of an Argument</strong><br>
|
|
<br>
|
|
</p></td>
|
|
<td width="257" valign="top"><p><strong class="blacktext11">Session 1b: Cyber/Security <br>
|
|
</strong><strong class="blacktext11">Infrastructures</strong><br>
|
|
<br>
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="257" valign="top"><p class="blacktext11"> 1.a.1<br>
|
|
<strong><a href="papers/1.a.1.pdf" target="_blank" class="gen1">Unplugged perils, lost hazards and failed mitigations</a></strong><br>
|
|
<span class="greytext11">N Barton, <em>RPS Group, UK</em>, A J Rae, <br>
|
|
</span><span class="greytext11"><em>University of York, UK</em></span></p></td>
|
|
<td width="257" valign="top"><p class="blacktext11">1.b.1 <strong><br>
|
|
<a href="papers/1.b.1.pdf" target="_blank" class="gen1">A practical proposal for ensuring the provenance of hardware devices and their safe operation</a></strong> <br>
|
|
<span class="greytext11">Y Kovalchuk, H Hu, D Gu<br>
|
|
</span><span class="greytext11">K D McDonald-Maier,<em> University of Essex, <br>
|
|
</em></span><span class="greytext11"><em>UK,</em> W G J Howells<em>, University of Kent, UK</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="257" valign="top"><p class="blacktext11">1.a.2<br>
|
|
<strong><a href="papers/1.a.2.pdf" target="_blank" class="gen1">ISO 26262 concept phase safety argument for a complex item</a></strong> <br>
|
|
<span class="greytext11">I Ibarra, S Hartley, S Crozier <br>
|
|
</span><span class="greytext11">D Ward, <em>MIRA Ltd, UK</em></span></p></td>
|
|
<td width="257" valign="top"><p class="blacktext11">1.b.2<br>
|
|
<strong><a href="papers/1.b.2.pdf" target="_blank" class="gen1">What does the assurance case approach deliver for critical information infrastructure protection in cyber security?</a></strong> <br>
|
|
<span class="greytext11">A C Goodger, N H M Caldwell, J T Knowles<br>
|
|
</span><span class="greytext11"><em>University of Cambridge, UK</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="257" height="109" valign="top"><p class="blacktext11">1.a.3 <strong><br>
|
|
<a href="papers/1.a.3.pdf" target="_blank" class="gen1">Evidence-based development - coupling structured argumentation with requirements development</a></strong> <br>
|
|
<span class="greytext11">A J J Dick, <em>Integrate Systems Engineering, <br>
|
|
</em></span><span class="greytext11"><em>UK</em></span></p></td>
|
|
<td width="257" valign="top"><p class="blacktext11">1.b.3 <strong><br>
|
|
<a href="papers/1.b.3.pdf" target="_blank" class="gen1">Preparing for cyber-attacks on air traffic management infrastructures: Cyber-safety scenario generation</a><br>
|
|
</strong><span class="greytext11">C W Johnson, <em>University of Glasgow, UK</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="257" height="96" valign="top"><p class="blacktext11">1.a.4 <strong><br>
|
|
<a href="papers/1.a.4.pdf" target="_blank" class="gen1">Towards understanding the DO-178C / ED-12C assurance case</a></strong> <br>
|
|
<span class="greytext11">C M Holloway, <em>NASA Langley Research<br>
|
|
</em></span><span class="greytext11"><em>Center, USA</em></span></p></td>
|
|
<td width="257" valign="top"><p class="blacktext11">1.b.4<br>
|
|
<strong><a href="papers/1.b.4.pdf" target="_blank" class="gen1">Cost effective assessment of the infrastructure security posture</a></strong> <br>
|
|
<span class="greytext11">G P Williams, <em>IT Governance Ltd, UK</em> </span></p></td>
|
|
</tr>
|
|
</table>
|
|
<br clear="all">
|
|
<table border="1" align="left" cellpadding="0" cellspacing="0" class="table-programme">
|
|
<tr>
|
|
<td colspan="2" valign="top"><p><strong>Keynote Address<br>
|
|
</strong><span class="blacktext11"><a href="biographies/peterladkin.pdf" target="_blank" class="gen1">Professor Peter Bernard Ladkin</a>, <em>University of Bielefeld CITEC and Causalis Ltd, Germany</em></span><br>
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="256" valign="top"><p><strong class="blacktext11">Session 2a: Software Safety - <br>
|
|
</strong><strong class="blacktext11">Architectures</strong><br>
|
|
</p></td>
|
|
<td width="258" valign="top"><p><strong class="blacktext11">Session 2b: Safety and Security</strong></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="256" valign="top"><p class="blacktext11">2.a.1<br>
|
|
<strong><a href="papers/2.a.1.pdf" target="_blank" class="gen1">Analysis and optimisation of mixed-criticality applications on partitioned distributed architectures</a></strong> <br>
|
|
<span class="greytext11">D Tamas-Selicean,S O Marinescu, P Pop <br>
|
|
</span><span class="greytext11"><em>Technical University of Denmark, Denmark</em></span></p></td>
|
|
<td width="258" valign="top"><p class="blacktext11">2.b.1 <strong><br>
|
|
<a href="papers/2.b.1.pdf" target="_blank" class="gen1">Generic security cases for information system security in healthcare systems</a></strong> <br>
|
|
<span class="greytext11">Y He, C W Johnson, <em>University of Glasgow, <br>
|
|
</em></span><span class="greytext11"><em>UK</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="256" valign="top"><p class="blacktext11">2.a.2 <strong><br>
|
|
<a href="papers/2.a.2.pdf" target="_blank" class="gen1">Capitalise on complexity</a></strong> <br>
|
|
<span class="greytext11">N Mc Guire, M Kreidl, <em>OpenTech EDV<br>
|
|
</em></span><span class="greytext11"><em> Research GmbH, Austria</em><br>
|
|
</span><span class="greytext11"> S Cheng, <em>Beijing Shenzhou Aerospace<br>
|
|
</em></span><span class="greytext11"><em> Software Technology Co., Ltd, China</em></span></p></td>
|
|
<td width="258" valign="top"><p class="blacktext11">2.b.2 <br>
|
|
<strong><a href="papers/2.b.2.pdf" target="_blank" class="gen1">On the relationship of hazards and threats in railway signalling</a></strong> <br>
|
|
<span class="greytext11">J Braband, M Seemann, <em>Siemens AG, <br>
|
|
</em></span><span class="greytext11"><em>Germany</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="256" valign="top"><p class="blacktext11">2.a.3 <strong><br>
|
|
<a href="papers/2.a.3.pdf" target="_blank" class="gen1">Applying failure mode modular de-composition (FMMD) across the software/hardware interface</a><br>
|
|
</strong><span class="greytext11">R Clark, <em>Energy<em> Technology Control, UK,<br>
|
|
</em></em>A Fish, C Garret, J Howse, <em>Univeristy of Brighton, UK</em></span></p></td>
|
|
<td width="258" valign="top"><p class="blacktext11">2.b.3 -<strong> Poster</strong><br>
|
|
<a href="papers/2.b.3.pdf" target="_blank" class="gen1"><strong>Assessing and improving software quality in safety critical systems bythe application of a software test maturity model</strong></a><br>
|
|
<span class="greytext11">F I Duncan, A G Smeaton,<em> BitWise Ltd, UK</em><em></em></span> </p></td>
|
|
</tr>
|
|
</table>
|
|
<br clear="all">
|
|
<table width="508" border="1" align="left" cellpadding="0" cellspacing="0" class="table-programme">
|
|
<tr>
|
|
<td valign="top"><p><strong class="blacktext11">Session 3a: Functional <br>
|
|
</strong><strong class="blacktext11">Safety </strong><br>
|
|
</p></td>
|
|
<td valign="top"><p><strong class="blacktext11">Session 3b: Safety and <br>
|
|
</strong><strong class="blacktext11">Security</strong><br>
|
|
</p></td>
|
|
<td valign="top"><p><strong class="blacktext11">Session 3c: Accident <br>
|
|
</strong><strong class="blacktext11"> Assessment</strong><br>
|
|
<strong></strong></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="186" valign="top"><p class="blacktext11">3.a.1 <strong><br>
|
|
<a href="papers/3.a.1.pdf" target="_blank" class="gen1">Failure modes and effect analysis (FMEA) and model-checking of software for embedded systems by sequential scheduling of vectors of logic-labelled finite-state machines</a></strong> <br>
|
|
<span class="greytext11">V Estivill-Castro, R Hexel, <br>
|
|
</span><span class="greytext11"><em>Griffith University, Australia</em><br>
|
|
</span><span class="greytext11"> D A Rosemblueth, <br>
|
|
</span><span class="greytext11"><em>Universidad Nacional <br>
|
|
</em></span><span class="greytext11"><em>Autonoma de Mexico, <br>
|
|
</em></span><span class="greytext11"><em> Mexico</em></span></p></td>
|
|
<td width="152" valign="top"><p class="blacktext11">3.a.1<a href="papers/3.b.1.pdf" target="_blank" class="gen1"><strong><br>
|
|
Security</strong> <strong>in integrated vetronics: Applying elliptic curve digital signature algorithm to a safety-critical network protocol – TTP/C</strong></a> <br>
|
|
<span class="greytext11">A Deshpande, O Obi<br>
|
|
</span><span class="greytext11">E Stipidis, P Charchalakis <br>
|
|
</span><span class="greytext11"><em>University of Brighton, UK</em></span></p></td>
|
|
<td width="174" valign="top"><p class="blacktext11">3.c.1 <strong><br>
|
|
<a href="papers/3.c.1.pdf" target="_blank" class="gen1">Comparing the identification of recommendations by different accident investigators using a common methodology</a></strong> <br>
|
|
<span class="greytext11">C W Johnson, <em>University of </em></span><span class="greytext11"><em>Glasgow, UK, </em>H A Oltedal<em>, </em></span><span class="greytext11"><em>Stord/Haugesund University </em></span><span class="greytext11"><em>College, Norway,
|
|
</em>C M <br>
|
|
</span><span class="greytext11">Holloway<em>, NASA Langley<br>
|
|
</em></span><span class="greytext11"><em> Research Center, USA</em><br>
|
|
</span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td valign="top"><p class="blacktext11">3.a.2 <strong> <br>
|
|
<a href="papers/3.a.2.pdf" target="_blank" class="gen1">Combined safety and security certification</a></strong> <br>
|
|
<span class="greytext11">G Romanski, <em>Verocel, Inc., <br>
|
|
</em></span><span class="greytext11"><em>USA</em></span></p></td>
|
|
<td valign="top"><p class="blacktext11">3.b.2 <strong><br>
|
|
<a href="papers/3.b.2.pdf" target="_blank" class="gen1">The application of data diodes for securely connecting nuclear power plant safety systems to the corporate IT network</a></strong> <br>
|
|
<span class="greytext11">R T Barker, C J Cheese<br>
|
|
</span><span class="greytext11"><em>EDF Energy, UK</em></span></p></td>
|
|
<td valign="top"><p class="blacktext11">3.c.2<br>
|
|
<strong><a href="papers/3.c.2.pdf" target="_blank" class="gen1">Analysis and modelling of space shuttle challenger accident using management oversight and risk tree (MORT)</a></strong><a href="papers/3.c.2.pdf" target="_blank" class="gen1"></a><br>
|
|
<span class="greytext11">S K Appicharla </span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td valign="top"><p class="blacktext11">3.a.3 - <strong>Poster</strong><br>
|
|
<strong><a href="papers/3.a.3.pdf" target="_blank" class="gen1">"You don't know Jack" - Using 3D anthropometric modelling techniques to identify, assess and aid the early resolution of safety issues relating to military vehicle design</a><br>
|
|
</strong><span class="greytext11">G Hudson, D Barker, <br>
|
|
</span><span class="greytext11"> J H Barton, <br>
|
|
</span><span class="greytext11"> D G B Varney,</span><span class="greytext11"><em>Atkins </em></span><span class="greytext11"><em>Defence, UK</em></span></p></td>
|
|
<td valign="top"><p class="blacktext11">3.b.3 <strong><br>
|
|
<a href="papers/3.b.3.pdf" target="_blank" class="gen1">A holistic approach to trustworthy software</a></strong> <br>
|
|
<span class="greytext11">I Bryant, <em>SSDRI, UK</em></span></p>
|
|
<p> </p></td>
|
|
<td valign="top"><p class="blacktext11">3.c.3 <strong> <br>
|
|
<a href="papers/3.c.3.pdf" target="_blank" class="gen1">Towards parsimonious resource allocation in context-aware N-version programming</a><br>
|
|
</strong><span class="greytext11">J Buys, V De Florio, <br>
|
|
</span><span class="greytext11"> C Blondia <em>University of <br>
|
|
</em></span><span class="greytext11"><em>Antwerp, Belgium</em></span></p></td>
|
|
</tr>
|
|
</table>
|
|
<br clear="all">
|
|
<h2 align="left"></h2>
|
|
<p align="left"></p>
|
|
<p align="left"></p>
|
|
<p align="left"><strong>Poster Presentation</strong><br>
|
|
<strong><a href="papers/poster-presentation.pdf" target="_blank" class="gen1">Ensuring supplier safety analysis is not performed in isolation! The gulf between the project safety engineer and the front line user</a><br>
|
|
</strong><span class="greytext11">N B Durston, <em>HP Enterprise Defence and Security Services Ltd, UK</em></span></p>
|
|
<p align="left"></p>
|
|
<p align="left"></p></td>
|
|
<td width="18"> </td>
|
|
</tr>
|
|
<tr>
|
|
<td height="10" colspan="3" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="740" height="10"></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
<tr>
|
|
<td height="36" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0" bgcolor="#03202E">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="760" height="36" align="center" valign="middle" class="footertext"><span class="footerwhite">© 2012 The Institution of Engineering and Technology <br/>
|
|
The Institution of Engineering and Technology is registered as a Charity in England & Wales (no 211014) and Scotland (no SC038698) </span></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
</table>
|
|
<map name="Map">
|
|
<area shape="rect" coords="-1,-2,77,54" href="http://www.theiet.org/" target="_blank" alt="The IET logo link" title="to the IET homepage">
|
|
</map>
|
|
</body>
|
|
</html>
|