Abstract is missing.
- Human-Computer System DependabilitySandro Bologna, Erik Hollnagel. 1-3 [doi]
- Dependability of Joint Human-Computer SystemsErik Hollnagel. 4-9 [doi]
- Dependability in the Information Society: Getting Ready for the FP6Andrea Servida. 10-18 [doi]
- A Rigorous View of Mode ConfusionJan Bredereke, Axel Lankenau. 19-31 [doi]
- Dependability as Ordinary ActionAlexander Voß, Roger Slack, Rob Procter, Robin Williams, Mark Hartswood, Mark Rouncefield. 32-43 [doi]
- Practical Solutions to Key Recovery Based on PKI in IP SecurityYoon-Jung Rhee, Tai-Yun Kim. 44-52 [doi]
- Redundant Data Acquisition in a Distributed Security CompoundThomas Droste. 53-60 [doi]
- Survivability Strategy for a Security Critical ProcessFerdinand J. Dafelmair. 61-69 [doi]
- Statistical Comparison of Two Sum-of-Disjoint-Product Algorithms for Reliability and Safety EvaluationKlaus D. Heidtmann. 70-81 [doi]
- Safety and Security Analysis of Object-Oriented ModelsKevin Lano, David Clark, Kelly Androutsopoulos. 82-93 [doi]
- The CORAS Framework for a Model-Based Risk Management ProcessRune Fredriksen, Monica Kristiansen, Bjørn Axel Gran, Ketil Stølen, Tom Arthur Opperud, Theodosis Dimitrakos. 94-105 [doi]
- Software Challenges in Aviation SystemsJohn C. Knight. 106-112 [doi]
- A Strategy for Improving the Efficiency of Procedure VerificationWenhui Zhang. 113-125 [doi]
- Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and TimeMassimo Benerecetti, Maurizio Panti, Luca Spalazzi, Simone Tacconi. 126-138 [doi]
- Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf ComponentsPeter T. Popov. 139-150 [doi]
- Assessment of the Benefit of Redundant SystemsLuping Chen, John H. R. May, Gordon Hughes. 151-162 [doi]
- Estimating Residual Faults from Code CoveragePeter G. Bishop. 163-174 [doi]
- Towards a Metrics Based Verification and Validation Maturity ModelJef Jacobs, Jos J. M. Trienekens. 175-185 [doi]
- Analysing the Safety of a Software Development ProcessStephen Paynter, Bob W. Born. 186-197 [doi]
- Software Criticality Analysis of COTS/SOUPPeter G. Bishop, Robin E. Bloomfield, Tim Clement, Sofia Guerra. 198-211 [doi]
- Methods of Increasing Modelling Power for Safety Analysis, Applied to a Turbine Digital Control SystemAndrea Bobbio, Ester Ciancamerla, Giuliana Franceschinis, Rossano Gaeta, Michele Minichino, Luigi Portinale. 212-223 [doi]
- Checking Safe Trajectories of Aircraft Using Hybrid AutomataÍtalo Romani de Oliveira, Paulo Sérgio Cugnasca. 224-235 [doi]
- Model-Based On-Line Monitoring Using a State Sensitive Fault Propagation ModelYiannis Papadopoulos. 236-248 [doi]
- On Diversity, and the Elusiveness of IndependenceBev Littlewood. 249-251 [doi]
- An Approach to a New Network Security Architecture for Academic EnvironmentsMahdiReza Mohajerani, Ali Moeini. 252-260 [doi]
- A Watchdog Processor Architecture with Minimal Performance OverheadFrancisco Rodríguez, José Carlos Campelo, Juan José Serrano. 261-272 [doi]
- Model-Checking Based on Fluid Petri Nets for the Temperature Control System of the ICARO Co-generative PlantMarco Gribaudo, András Horváth, Andrea Bobbio, Enrico Tronci, Ester Ciancamerla, Michele Minichino. 273-283 [doi]
- Assertion Checking Environment (ACE) for Formal Verification of C ProgramsBabita Sharma, S. D. Dhodapkar, S. Ramesh. 284-295 [doi]
- Safety Analysis of the Height Control System for the ElbtunnelFrank Ortmeier, Gerhard Schellhorn, Andreas Thums, Wolfgang Reif, Bernhard Hering, Helmut Trappschuh. 296-308 [doi]
- Dependability and Configurability: Partners or Competitors in Pervasive Computing?Titos Saridakis. 309-320 [doi]
- Architectural Considerations in the Certification of Modular SystemsIain Bate, Tim Kelly. 321-333 [doi]
- A Problem-Oriented Approach to Common Criteria CertificationThomas Rottke, Denis Hatebur, Maritta Heisel, Monika Heiner. 334-346 [doi]