The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. Databases are no longer stand-alone systems accessible only to internal users of organizations. Today, businesses must allow selective access from different security domains. New
Recent Advances in Systems Safety and Security
β Scribed by Emil Pricop, Grigore Stamatescu (eds.)
- Publisher
- Springer International Publishing
- Year
- 2016
- Tongue
- English
- Leaves
- 267
- Series
- Studies in Systems, Decision and Control 62
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security β IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.
β¦ Table of Contents
Front Matter....Pages i-xi
The Theory of Witness-Functions....Pages 1-19
Quantification of Centralized/Distributed Secrecy in Stochastic Discrete Event Systems....Pages 21-40
Framework for Cognitive Radio Deployment in Large Scale WSN-UAV Surveillance....Pages 41-56
Using Modeling and Dynamic Simulation Techniques for Systemsβ Safety and Security....Pages 57-77
HAZOP-Based Security Analysis for Embedded Systems: Case Study of Open Source Immobilizer Protocol Stack....Pages 79-96
Multimodal Heterogeneous Monitoring of Super-Extended Objects: Modern View....Pages 97-116
Image Based Control of a Simple Mobile Robotic System....Pages 117-137
On Using a Cloud-Based Approach to Develop a Mobile Asset Management Solution....Pages 139-155
Execution of an IEC61499 Application on a Remote Server....Pages 157-177
Evolution of Legal Issues of Honeynets....Pages 179-200
A Risk Screening System by Network Diagram Recognition for Information Security Audit....Pages 201-210
Risk Analysis and Optimal Model for Efficiency of Reengineering the Independent Power Grids....Pages 211-222
Innovative Fuzzy Approach on Analyzing Industrial Control Systems Security....Pages 223-239
IPv6 Sensor Networks Modeling for Security and Communication Evaluation....Pages 241-259
Back Matter....Pages 261-262
β¦ Subjects
Computational Intelligence; Communications Engineering, Networks; Systems and Data Security
π SIMILAR VOLUMES
<p>This volume is an initiative undertaken by the IEEE Computational Intelligence Societyβs Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from t
<p>This volume contains invited and contributed papers presented at the NATO Advanced study Insti tute on "Recent Advances in Speech Understanding and Dialog systems" held in Bad Windsheim, Federal Republic of Germany, July 5 to July 18, 1987. It is divided into the three parts Speech coding and Seg
<p><p>This book explores the latest research trends in intelligent systems and smart applications. It presents high-quality empirical and review studies focusing on various topics, including information systems and software engineering, knowledge management, technology in education, emerging technol