Abstract is missing.
- Making the Case for Safety of Machine Learning in Highly Automated DrivingSimon Burton, Lydia Gauerhof, Christian Heinzemann. 5-16 [doi]
- A Thought Experiment on Evolution of Assurance Cases - - from a Logical AspectShuji Kinoshita, Yoshiki Kinoshita. 17-26 [doi]
- Using an Assurance Case Framework to Develop Security Strategy and PoliciesRobin Bloomfield, Peter G. Bishop, Eoin Butler, Kateryna Netkachova. 27-28 [doi]
- Uniform Model Interface for Assurance Case Integration with System ModelsAndrzej Wardzinski, Paul Jones. 39-51 [doi]
- ExplicitCase: Integrated Model-Based Development of System and Safety CasesCarmen Cârlan, Simon Barner, Alexander Diewald, Alexandros Tsalidis, Sebastian Voss. 52-63 [doi]
- D-Case Communicator: A Web Based GSN Editor for Multiple StakeholdersYutaka Matsuno. 64-69 [doi]
- Towards Combined Safety and Security Constraints AnalysisDaniel Pereira, Celso Hirata, Rodrigo Pagliares, Simin Nadjm-Tehrani. 70-80 [doi]
- Attack Modeling for System Security Analysis - (Position Paper)Abdullah Altawairqi, Manuel Maarek. 81-86 [doi]
- Reconciling Systems-Theoretic and Component-Centric Methods for Safety and Security Co-analysisWilliam G. Temple, Yue Wu, Binbin Chen, Zbigniew Kalbarczyk. 87-93 [doi]
- Analysis of Potential Code Vulnerabilities Involving Overlapping InstructionsLoui Al Sardy, Tong Tang, Marc Spisländer, Francesca Saglietti. 103-113 [doi]
- Increasing Dependability in Safety Critical CPSs Using Reflective StatechartsMiren Illarramendi Rezabal, Leire Etxeberria, Xabier Elkorobarrutia, Goiuria Sagardui. 114-126 [doi]
- A Survey of Hardware Technologies for Mixed-Critical Integration Explored in the Project EMC^2Haris Isakovic, Radu Grosu, Denise Ratasich, Jiri Kadlec, Zdenek Pohl, Steve Kerrison, Kyriakos Georgiou, Kerstin Eder, Norbert Druml, Lillian Tadros, Flemming Christensen, Emilie Wheatley, Bastian Farkas, Rolf Meyer, Mladen Berekovic. 127-140 [doi]
- Safe Implementation of Mixed-Criticality Applications in Multicore Platforms: A Model-Based Design ApproachPasquale Antonante, Juan Valverde-Alcalá, Stylianos Basagiannis, Marco Di Natale. 141-156 [doi]
- GSN Support of Mixed-Criticality Systems CertificationCarlos Fernando Nicolas, Fernando Eizaguirre, Asier Larrucea, Simon Barner, Franck Chauvel, Goiuria Sagardui, Jon Pérez. 157-172 [doi]
- Concepts for Reliable Communication in a Software-Defined Network ArchitectureFerdinand von Tüllenburg, Thomas Pfeiffenberger. 173-186 [doi]
- Combining Safety and Security Analysis for Industrial Collaborative Automation SystemsSándor Plósz, Christoph Schmittner, Pál Varga. 187-198 [doi]
- Software Updates in Safety and Security Co-engineeringImanol Mugarza, Jorge Parra, Eduardo Jacob. 199-210 [doi]
- Detailed Analysis of Security Evaluation of Automotive Systems Based on JASO TP15002Yasuyuki Kawanishi, Hideaki Nishihara, Daisuke Souma, Hirotaka Yoshida. 211-224 [doi]
- Systematic Composition of Services from Distributed Systems for Highly Dynamic Collaboration ProcessesSebastian Müller, Peter Liggesmeyer. 225-236 [doi]
- Safety Assurance for Autonomous and Collaborative Medical Cyber-Physical SystemsFábio Luiz Leite Jr., Rasmus Adler, Patrik Feth. 237-248 [doi]
- Safety-Aware Control of Swarms of DronesAmin Majd, Elena Troubitsyna, Masoud Daneshtalab. 249-260 [doi]
- Representation of Safety Standards with Semantic Technologies Used in Industrial EnvironmentsJose Luis de la Vara, Álvaro Gómez, Elena Gallego, Gonzalo Génova, Anabel Fraga. 265-272 [doi]
- Automotive SPICE, Safety and Cybersecurity IntegrationGeorg Macher, Alexander Much, Andreas Riel, Richard Messnarz, Christian Kreiner. 273-285 [doi]
- Safety and Security Co-engineering and Argumentation FrameworkHelmut Martin, Robert Bramberger, Christoph Schmittner, Zhendong Ma, Thomas Gruber, Alejandra Ruiz, Georg Macher. 286-297 [doi]
- Process Assessment in Supplier Selection for Safety-Critical Systems in Nuclear DomainTimo Varkoi, Risto Nevalainen. 298-308 [doi]
- A Runtime Risk Assessment Concept for Safe Reconfiguration in Open Adaptive SystemsNikita Bhardwaj, Peter Liggesmeyer. 309-316 [doi]
- Assuring Degradation Cascades of Car Platoons via ContractsIrfan Sljivo, Barbara Gallina, Bernhard Kaiser. 317-329 [doi]
- Transparent Personal Data Processing: The Road AheadPiero A. Bonatti, Sabrina Kirrane, Axel Polleres, Rigo Wenning. 337-349 [doi]
- The Use of Data Protection Regulatory Actions as a Data Source for Privacy EconomicsAaron Ceross, Andrew Simpson. 350-360 [doi]
- Automated Legal Compliance Checking by Security Policy AnalysisSilvio Ranise, Hari Siswantoro. 361-372 [doi]
- Access Control Policy Coverage Assessment Through MonitoringAntonello Calabrò, Francesca Lonetti, Eda Marchetti. 373-383 [doi]
- Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep LearningGiacomo Giorgi, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi. 384-395 [doi]
- Security Flows in OAuth 2.0 Framework: A Case StudyMarios Argyriou, Nicola Dragoni, Angelo Spognardi. 396-406 [doi]
- PolEnA: Enforcing Fine-grained Permission Policies in AndroidGabriele Costa, Federico Sinigaglia, Roberto Carbone. 407-414 [doi]
- Fast Estimation of Privacy Risk in Human Mobility DataRoberto Pellungrini, Luca Pappalardo, Francesca Pratesi, Anna Monreale. 415-426 [doi]
- Security and Privacy in the Automotive Domain: A Technical and Social AnalysisZhendong Ma, Walter Seböck, Bettina Pospisil, Christoph Schmittner, Thomas Gruber. 427-434 [doi]
- One Click Privacy for Online Social NetworksPhilipp Hehnle, Pascal Keilbach, Hyun-Jin Lee, Sabrina Lejn, Daniel Steidinger, Marina Weinbrenner, Hanno Langweg. 435-442 [doi]
- Modeling Rover Communication Using Hierarchical State Machines with ScalaKlaus Havelund, Rajeev Joshi. 447-461 [doi]
- Towards Component-Based (max, +) Algebraic Throughput Analysis of Hierarchical Synchronous Data Flow ModelsMladen Skelin, Marc Geilen. 462-476 [doi]