247 lines
13 KiB
HTML
247 lines
13 KiB
HTML
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
|
|
"http://www.w3.org/TR/html4/loose.dtd">
|
|
<html>
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
|
|
|
|
<title>Programme :: System Safety | IET</title>
|
|
<link href="css/styles.css" rel="stylesheet" type="text/css">
|
|
<style type="text/css">
|
|
<!--
|
|
a:link {
|
|
text-decoration: none;
|
|
}
|
|
a:visited {
|
|
text-decoration: none;
|
|
}
|
|
a:hover {
|
|
text-decoration: underline;
|
|
}
|
|
a:active {
|
|
text-decoration: none;
|
|
}
|
|
body {
|
|
background-color: #e5e8ea;
|
|
}
|
|
|
|
.prognavigation1 {
|
|
font-family: Arial, Helvetica, sans-serif;
|
|
font-size: 12px;
|
|
color: #ffffff;
|
|
font-weight:bold;
|
|
padding-left: 5px;
|
|
padding-right:5px;
|
|
}
|
|
.prognavigation2 {
|
|
font-family: Arial, Helvetica, sans-serif;
|
|
font-size: 12px;
|
|
color: #000000;
|
|
padding-left: 5px;
|
|
padding-right:5px;
|
|
}
|
|
.style1 {font-size: 16px}
|
|
.table-programme { width:520px;
|
|
border:1px solid #dae3ee;
|
|
margin:0px;
|
|
margin-left:5px;
|
|
background:#fefefe;
|
|
border-collapse:collapse;
|
|
}
|
|
|
|
.table-programme {
|
|
width:520px;
|
|
border:1px solid #dae3ee;
|
|
margin:0px;
|
|
margin-left:5px;
|
|
background:#fefefe;
|
|
border-collapse:collapse;
|
|
}
|
|
|
|
.table-programme td {
|
|
border:1px solid #dae3ee;
|
|
padding:8px;
|
|
font-size: 12px;
|
|
}
|
|
|
|
.table-programme ul {
|
|
text-align: left;
|
|
padding-left: 10px;
|
|
padding-top: 0px;
|
|
padding-right:0px;
|
|
}
|
|
|
|
-->
|
|
</style>
|
|
</head>
|
|
|
|
<body>
|
|
<div align="center">
|
|
<table width="760" border="0" cellpadding="0" cellspacing="0" class="fourlines">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="760" height="150" valign="top"><img src="images/header.jpg" width="760" height="150" border="0" usemap="#Map"></td>
|
|
</tr>
|
|
<tr>
|
|
<td height="40" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0" class="nav_bg">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="760" height="40" align="left" valign="middle" class="whitetextindent10"><a href="index.htm" class="whitetextindent10">Welcome</a> | <a href="about.htm" class="whitetextindent10">About this CD-ROM</a> | <a href="presentations.htm" class="whitetextindent10">Papers</a> | <a href="authors.htm" class="whitetextindent10">Author List</a> | <a href="join.htm" class="whitetextindent10">Join the IET </a> | <a href="contactus.htm" class="whitetextindent10">Contact us</a></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
<tr>
|
|
<td height="385" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0" bgcolor="#FFFFFF">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td height="10" colspan="5" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="760" height="10"></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="10" rowspan="3" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="10" height="375"> </td>
|
|
</tr>
|
|
</table></td>
|
|
<td height="28" colspan="3" align="left" valign="top" class="titletext"><table width="100%" border="0" cellspacing="0" cellpadding="0">
|
|
<tr>
|
|
<td width="372" height="28" valign="middle"><div align="left"><strong>Papers</strong></div></td>
|
|
<td width="57" align="center" bgcolor="#e6e7ea"><a href="day1.htm" class="prognavigation2">Day 1</a></td>
|
|
<td width="7"><div align="center"></div></td>
|
|
<td width="57" align="center" bgcolor="#000000"><a href="day2.htm" class="prognavigation1">Day 2</a></td>
|
|
<td width="7"><div align="center"></div></td>
|
|
<td width="7"><div align="center"></div></td>
|
|
<td width="16"><div align="center"></div></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="186" height="379" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="186" height="394" valign="top"><img src="images/content_mft.jpg" width="186" height="394"></td>
|
|
</tr> </table></td>
|
|
<td width="536" align="left" valign="top" class="blacktext11">
|
|
<p><br>
|
|
</p>
|
|
<h2 align="left">Wednesday, 17 October 2012</h2>
|
|
<table border="1" cellpadding="0" cellspacing="0" align="left"class="table-programme">
|
|
<tr>
|
|
<td colspan="2" valign="top"><p><span class="blacktext11"><strong>Keynote Address </strong> <br>
|
|
<strong>Cyber security - who says we are safe? </strong><br>
|
|
<a href="biographies/mikestjohngreen.pdf" target="_blank" class="gen1">Mike St John-Green</a>, <em>Independent expert in cyber security, UK</em></span><br>
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="250" valign="top"><p><strong class="blacktext11">Session 4a: Integrating the Human</strong><br>
|
|
</p></td>
|
|
<td width="264" valign="top"><p><strong class="blacktext11">Session 4b: Cyber Assessment of <br>
|
|
</strong><strong class="blacktext11">Systems</strong><br>
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="250" valign="top"><p class="blacktext11">4.a.1<br>
|
|
<strong><a href="papers/4.a.1.pdf" target="_blank" class="gen1">Securing the human to protect the system: Human factors in cyber security</a></strong> <br>
|
|
<span class="greytext11">M G Lee, <em>Symantec.cloud, UK</em></span></p></td>
|
|
<td width="264" valign="top"><p class="blacktext11">4.b.1<br>
|
|
<strong><a href="papers/4.b.1.pdf" target="_blank" class="gen1">System security assessments using a cyber range</a></strong><br>
|
|
<span class="greytext11">H Winter, <em>Northrop Grumman Information <br>
|
|
</em></span><span class="greytext11"><em>Systems Europe, UK</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="250" valign="top"><p class="blacktext11">4.a.2 <strong><br>
|
|
<a href="papers/4.a.2.pdf" target="_blank" class="gen1">Safety enhancement through situation-aware user interfaces</a></strong> <br>
|
|
<span class="greytext11">V De Florio, C Blondia, <em>University of <br>
|
|
</em></span><span class="greytext11"><em>Antwerp and IBBT, Belgium</em></span></p></td>
|
|
<td width="264" valign="top"><p class="blacktext11">4.b.2 <strong><br>
|
|
<a href="papers/4.b.2.pdf" target="_blank" class="gen1">Emerging good practice for cyber security of industrial control systems and SCADA</a></strong> <br>
|
|
<span class="greytext11">R S H Piggin, <em>Atkins, UK</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td colspan="2" valign="top"><p><span class="blacktext11"><strong>Keynote Address</strong><br>
|
|
<strong>The safety of complex engineered products - what's changed since Haddon-Cave?</strong><br>
|
|
<a href="biographies/drchriselliott.pdf" target="_blank" class="gen1">Dr Chris Elliott</a>, Director, <em>Pitchill Consulting Ltd, UK</em></span><br>
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="250" valign="top"><p class="blacktext11"><strong>Session 5a: SILs – The enduring challenge</strong></p>
|
|
<p> </p></td>
|
|
<td width="264" valign="top"><p><strong class="blacktext11">Session 5b: Governance</strong> <br>
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="250" valign="top"><p class="blacktext11">5.a.1 <br>
|
|
<strong><a href="papers/5.a.1.pdf" target="_blank" class="gen1">The uses and abuses of ASIL decomposition in ISO 26262</a></strong> <br>
|
|
<span class="greytext11">D Ward, S E Crozier, <em>MIRA Ltd, UK</em></span></p></td>
|
|
<td width="264" valign="top"><p class="blacktext11">5.b.1<br>
|
|
<span class="gen1"><strong><a href="papers/5.b.1.pdf" target="_blank" class="gen1">The four principles of product safety</a></strong></span> <br>
|
|
<span class="greytext11">N Sibley, B Walby, D Priestley, <em>BAE Systems, <br>
|
|
</em></span><span class="greytext11"><em>UK</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="250" valign="top"><p class="blacktext11">5.a.2 <br>
|
|
<strong><a href="papers/5.a.2.pdf" target="_blank" class="gen1">Agonising over ASILS: Controllability and the in-wheel motor</a></strong> <br>
|
|
<span class="greytext11">M Ellims, H E Monkhouse, <em>Protean Electric </em></span><span class="greytext11"><em>Ltd, UK</em></span></p></td>
|
|
<td width="264" valign="top"><p class="blacktext11">5.b.2<br>
|
|
<strong><a href="papers/5.b.2.pdf" target="_blank" class="gen1">Trust and control: A safety model for people and organisations</a></strong> <br>
|
|
<span class="greytext11">W A Hoskins, <em>ARCADIS UK Ltd, UK</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="250" valign="top"><p><strong class="blacktext11">Session 6a: Incident Assessment</strong><br>
|
|
</p></td>
|
|
<td width="264" valign="top"><p><strong class="blacktext11">Session 6b: Trends and Assurance </strong><br>
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="250" valign="top"><p class="blacktext11">6.a.1 <strong><br>
|
|
<a href="papers/6.a.1.pdf" target="_blank" class="gen1">The SAVE ME project real-time disaster mitigation and evacuation management system</a></strong> <br>
|
|
<span class="greytext11">I Tsekourakis, C H Orlis, D Ioannidis, <br>
|
|
</span><span class="greytext11"> D Tzovaras, <em>Information Technologies <br>
|
|
</em></span><span class="greytext11"><em>Institute, Greece</em></span></p></td>
|
|
<td width="264" valign="top"><p class="blacktext11">6.b.1 <br>
|
|
<strong><a href="papers/6.b.1.pdf" target="_blank" class="gen1">A framework for determining the sufficiency of software safety assurance</a></strong> <br>
|
|
<span class="greytext11">R D Hawkins, T P Kelly, <em>University of York, UK</em></span></p></td>
|
|
</tr>
|
|
<tr>
|
|
<td width="250" valign="top"><p class="blacktext11">6.a.2<br>
|
|
<a href="papers/6.a.2.pdf" target="_blank" class="gen1">(<strong>SMA)2 - A social media audience sharing model for authorities to support effective crisis communication</strong></a> <br>
|
|
<span class="greytext11">S Raue, C W Johnson, T Storer, <em>University </em></span><span class="greytext11"><em>of Glasgow, UK</em></span></p></td>
|
|
<td width="264" valign="top"><p class="blacktext11">6.b.2 <br>
|
|
<strong><a href="papers/6.b.2.pdf" target="_blank" class="gen1">Emerging technologies with the potential to impact safety in defence</a></strong> <br>
|
|
<span class="greytext11">P R Caseley, G T Strong, D J Holland Smith,<br>
|
|
</span><span class="greytext11">K J Bown, B K Madahar, <em>Dstl, UK</em></span></p></td>
|
|
</tr>
|
|
</table>
|
|
<p> </p> </td>
|
|
<td width="18"> </td>
|
|
</tr>
|
|
<tr>
|
|
<td height="10" colspan="3" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="740" height="10"></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
<tr>
|
|
<td height="36" valign="top"><table width="100%" border="0" cellpadding="0" cellspacing="0" bgcolor="#03202E">
|
|
<!--DWLayoutTable-->
|
|
<tr>
|
|
<td width="760" height="36" align="center" valign="middle" class="footertext"><span class="footerwhite">© 2012 The Institution of Engineering and Technology <br/>
|
|
The Institution of Engineering and Technology is registered as a Charity in England & Wales (no 211014) and Scotland (no SC038698) </span></td>
|
|
</tr>
|
|
</table></td>
|
|
</tr>
|
|
</table>
|
|
<map name="Map">
|
|
<area shape="rect" coords="-1,-2,77,54" href="http://www.theiet.org/" target="_blank" alt="The IET logo link" title="to the IET homepage">
|
|
</map>
|
|
</body>
|
|
</html>
|