Conferences related to Software Safety

Back to Top

2020 IEEE International Conference on Robotics and Automation (ICRA)

The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE)

ICSE is the premier forum for researchers to present and discuss the most recent innovations,trends, outcomes, experiences, and challenges in the field of software engineering. The scopeis broad and includes all original and unpublished results of empirical, conceptual, experimental,and theoretical software engineering research.


Oceans 2020 MTS/IEEE GULF COAST

To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.

  • OCEANS 2018 MTS/IEEE Charleston

    Ocean, coastal, and atmospheric science and technology advances and applications

  • OCEANS 2017 - Anchorage

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorials on ocean technology, workshops and town meetings on policy and governmental process.

  • OCEANS 2016

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 500 technical papers and 150 -200 exhibits.

  • OCEANS 2015

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2014

    The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2013

    Three days of 8-10 tracks of technical sessions (400-450 papers) and concurent exhibition (150-250 exhibitors)

  • OCEANS 2012

    Ocean related technology. Tutorials and three days of technical sessions and exhibits. 8-12 parallel technical tracks.

  • OCEANS 2011

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2010

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2009

  • OCEANS 2008

    The Marine Technology Society (MTS) and the Oceanic Engineering Society (OES) of the Institute of Electrical and Electronic Engineers (IEEE) cosponsor a joint conference and exposition on ocean science, engineering, education, and policy. Held annually in the fall, it has become a focal point for the ocean and marine community to meet, learn, and exhibit products and services. The conference includes technical sessions, workshops, student poster sessions, job fairs, tutorials and a large exhibit.

  • OCEANS 2007

  • OCEANS 2006

  • OCEANS 2005

  • OCEANS 2004

  • OCEANS 2003

  • OCEANS 2002

  • OCEANS 2001

  • OCEANS 2000

  • OCEANS '99

  • OCEANS '98

  • OCEANS '97

  • OCEANS '96


2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability


More Conferences

Periodicals related to Software Safety

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


More Periodicals

Most published Xplore authors for Software Safety

Back to Top

Xplore Articles related to Software Safety

Back to Top

A structured approach to selecting and justifying software safety evidence

5th IET International Conference on System Safety 2010, 2010

The safety assurance of software is ultimately demonstrated by the evidence that is put forward. There is a range of existing guidance on the types of evidence that may be used to demonstrate the safety of software, however questions remain as to the sufficiency of the evidence suggested by such guidance. We propose that the only way to determine the ...


Software safety handbook

Proceedings of the Fourth Annual Conference on Computer Assurance, 'Systems Integrity, Software Safety and Process Security, 1989

A software safety handbook developed for system safety engineers to use in tailoring, planning, and executing a software safety policy is presented. The handbook provides background information, program considerations, how-to sections on software analysis, design and code walkthrough checklists, and supplementary reading. It is asserted that many directives, current analysis techniques, and databases for hardware system safety are usable, with ...


Study on Software Safety for Naval Equipment System

2016 3rd International Conference on Information Science and Control Engineering (ICISCE), 2016

Navy equipment software is safety critical software. Software safety is an important factor for naval equipment achieving combat mission successfully. According to characteristics of navy equipment system and its software, this paper has proposed a software safety engineering method basing on system theory. Further, it has described safety tasks in each stage included in software lifecycle. Finally, according to the ...


Validation through exclusion: techniques for ensuring software safety

Proceedings of the Fourth Annual Conference on Computer Assurance, 'Systems Integrity, Software Safety and Process Security, 1989

An approach to software safety is presented that emphasizes the construction of a test set for checking that conditions leading to software safety failures do not occur. The approach combines some mutation analysis along with some recent work on the fundamentals of testing. This approach tests over a very constrained space of functions where the test sets are determined by ...


Using Petri net theory to analyze software safety case studies

Proceedings of the Fourth Annual Conference on Computer Assurance, 'Systems Integrity, Software Safety and Process Security, 1989

Research is described regarding the use of Petri net theory to analyze selected, well-known software safety case studies. The analysis focused on the n-connectedness characteristics of the Petri nets. Interpretation of the analysis results produced the following conclusions: (1) all of the Petri nets had instances of 1-connectedness at the point depicting where the software failures occurred; and (2) instances ...


More Xplore Articles

Educational Resources on Software Safety

Back to Top

IEEE-USA E-Books

  • A structured approach to selecting and justifying software safety evidence

    The safety assurance of software is ultimately demonstrated by the evidence that is put forward. There is a range of existing guidance on the types of evidence that may be used to demonstrate the safety of software, however questions remain as to the sufficiency of the evidence suggested by such guidance. We propose that the only way to determine the sufficiency of the evidence is to consider its capability to address specific explicit safety assurance claims in a software safety argument. In this paper we propose a lightweight approach to selecting and assessing software safety evidence.

  • Software safety handbook

    A software safety handbook developed for system safety engineers to use in tailoring, planning, and executing a software safety policy is presented. The handbook provides background information, program considerations, how-to sections on software analysis, design and code walkthrough checklists, and supplementary reading. It is asserted that many directives, current analysis techniques, and databases for hardware system safety are usable, with some modification, for software safety determination.<<ETX>>

  • Study on Software Safety for Naval Equipment System

    Navy equipment software is safety critical software. Software safety is an important factor for naval equipment achieving combat mission successfully. According to characteristics of navy equipment system and its software, this paper has proposed a software safety engineering method basing on system theory. Further, it has described safety tasks in each stage included in software lifecycle. Finally, according to the goal of software safety, it has presented software safety management system to ensure safety of naval equipment software. The research has positive significance for healthy development of navy equipment software.

  • Validation through exclusion: techniques for ensuring software safety

    An approach to software safety is presented that emphasizes the construction of a test set for checking that conditions leading to software safety failures do not occur. The approach combines some mutation analysis along with some recent work on the fundamentals of testing. This approach tests over a very constrained space of functions where the test sets are determined by a type of software fault tree analysis. It is shown that test sets can be derived with the guarantee that if the system passes its tests, then it is correct (i.e., safe) or suffers from some safety flaw not reflected in the model.<<ETX>>

  • Using Petri net theory to analyze software safety case studies

    Research is described regarding the use of Petri net theory to analyze selected, well-known software safety case studies. The analysis focused on the n-connectedness characteristics of the Petri nets. Interpretation of the analysis results produced the following conclusions: (1) all of the Petri nets had instances of 1-connectedness at the point depicting where the software failures occurred; and (2) instances of 1-connectedness similar to those described indicate situations where the software should implement some type of exception-handling capability.<<ETX>>

  • Software safety goal verification using fault tree techniques: a critically ill patient monitor example

    A systematic form of software safety goal verification using fault tree techniques is presented and applied to a patient monitor. The process provides: mapping out test procedures for stated safety goals; a concise archive of the safety subset of the product test documentation; and hazard avoidance verification as indicated by a preliminary hazard analysis. The fault tree for the monitor produced a total of 42 test procedures for final system test use. The time for tree and test generation was six man weeks, and the tests required two man weeks to complete. The tests were instrumental in finding 16% of the total defects and 36% of the critical defects for this product.<<ETX>>

  • Software Safety Certification Framework Based on Safety Case

    The aim of software safety certification is to determine whether software has achieved the safety that system requests. This paper advances a software safety certification framework based on safety case from the view of product, providing software safety evidence which can be applied independently of software development process. First the conception, structure, significance and presentation method of safety case are introduced. Then the software safety certification framework is further elaborated, including safety claim acquisition, argument constituent and evidence selection. And then GSN safety case patterns are advanced for applying certification framework. Finally, the framework is applied in practice, which preliminarily shows its effectiveness. The framework doesn't preclude the use of existing standards. A key motivation in producing the paper is to demonstrate safety-critical software acceptance by unconventional views to critical review.

  • Regulatory requirements for software safety: policy issues (panel position statement)

    Technological and nontechnological problems in the development, maintenance, and use of safe software are identified. It is argued that achieving adequate safety in computer-related systems requires both technological and nontechnological solutions. It is suggested that realistic regulatory measures are needed.<<ETX>>

  • A methodology for evaluating, comparing, and selecting software safety and reliability standards

    The U.S. Food and Drug Administration (FDA) regulates $960 billion worth of products, which accounts for approximately 25 cents of every dollar spent annually by American consumers. The regulatory environment is quite different from the contractual environment where the use of particular standards is dictated. In contrast the regulated industries, which in FDA's case includes the manufacturers of food, cosmetics, pharmaceuticals, and medical devices, are responsible for selecting and justifying the selection and use of appropriate national and/or international consensus standards. The challenge faced by the regulated industries is how to evaluate and select appropriate standards, in particular safety and reliability standards.

  • Derivation of Railway Software Safety Criteria and Management Procedure

    Ariane 5 rocket which is a test flight of European Space Agency was exploded 37 seconds after launch due to a malfunction in the control software. The amount of this loss is more than US$370 million. The accident has initiated the criticality of the software safety. Nowadays software is widely used in the safety critical system because of the merit of the flexibility. But the flexibility makes it difficult to predict the software failures. This paper suggests software safety criteria for the safety critical railway system and describes the quality management procedure of the railway software.



Standards related to Software Safety

Back to Top

IEEE Standard Criteria for Digital Computers in Safety Systems of Nuclear Power Generating Stations

This standard serves to amplify criteria in IEEE Std 603-2009, IEEE Standard Criteria for Safety Systems for Nuclear Power Generating Stations, to address the use of computers as part of safety systems in nuclear power generating stations. The criteria contained herein, in conjunction with criteria in IEEE Std 603-2009, establish minimum functional and design requirements for computers used as components ...


IEEE Standard for Software Safety Plans



Jobs related to Software Safety

Back to Top