Software safety: why, what, and how
ACM Computing Surveys (CSUR)
Experience with Formal Methods in Critical Systems
IEEE Software
Network security: private communication in a public world
Network security: private communication in a public world
Safeware: system safety and computers
Safeware: system safety and computers
Verification of a safety-critical railway interlocking system with real-time constraints
Science of Computer Programming
Communications of the ACM
Applying the dependability paradigm to computer security
NSPW '95 Proceedings of the 1995 workshop on New security paradigms
Safe and sound: a safety-critical approach to security
Proceedings of the 2001 workshop on New security paradigms
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Safety critical systems: challenges and directions
Proceedings of the 24th International Conference on Software Engineering
FME '94 Proceedings of the Second International Symposium of Formal Methods Europe on Industrial Benefit of Formal Methods
HAZOP Analysis of Formal Models of Safety-Critical Interactive Systems
SAFECOMP '00 Proceedings of the 19th International Conference on Computer Safety, Reliability and Security
Software Challenges in Aviation Systems
SAFECOMP '02 Proceedings of the 21st International Conference on Computer Safety, Reliability and Security
Seven More Myths of Formal Methods
FME '94 Proceedings of the Second International Symposium of Formal Methods Europe on Industrial Benefit of Formal Methods
Formal Methods in the Railways Signalling Industry
FME '94 Proceedings of the Second International Symposium of Formal Methods Europe on Industrial Benefit of Formal Methods
Formalising British Rail's Signalling Rules
FME '94 Proceedings of the Second International Symposium of Formal Methods Europe on Industrial Benefit of Formal Methods
Validation of a Railway Interlocking Model
FME '94 Proceedings of the Second International Symposium of Formal Methods Europe on Industrial Benefit of Formal Methods
Security Assessments of Safety Critical Systems Using HAZOPs
SAFECOMP '01 Proceedings of the 20th International Conference on Computer Safety, Reliability and Security
Security and Dependability: Then and Now
CSDA '98 Proceedings of the Conference on Computer Security, Dependability, and Assurance: From Needs to Solutions
Poisoning the Software Supply Chain
IEEE Security and Privacy
Predicting vertical acceleration of railway wagons using regression algorithms
IEEE Transactions on Intelligent Transportation Systems
Using static analysis tools to detect and correct non-compliant cryptography
ACM SIGSOFT Software Engineering Notes
Hi-index | 0.00 |
Systems whose failure can lead to the damage of property or the environment, or loss of human life are regarded as safety-critical systems. It is no longer adequate to build safety-critical systems based on the control of errors and failures alone. Safety-critical systems must also deal with securing the data that is used in their operation. While safety and security engineering have evolved separately, there are a number of similarities. These similarities and efforts to integrate safety and security are identified. A project looking at securing safety-critical communications for the Australian rail network is also discussed.