Abstract-Safety critical systems can suffer severe and even fatal consequences due to aberrant behavior of human operators. Human operators are unique in their decision making capability, judgment and nondeterminism. There is a need for analyzing the interactions among computer systems and human operators where the operators are allowed to deviate from their prescribed behaviors for executing a task. In this paper we wish to examine the ability of a system to remain safe under broad classes of variations of the prescribed human task. To facilitate this concept we consider the concept of a protection envelope giving a wider class of behaviors than strictly prescribed by the human task while providing guarantees of restrictions on human opera...
In this paper we provide a conceptual model useful for describing the cyclic interactions of a compu...
There continue to be numerous breaches publicised pertaining to cybersecurity despite security pract...
This paper will show in detail the differences between safety and security. An argument is made for ...
Human operators are unique in their decision making capability, judgment and nondeterminism. Their s...
A safety verification task involves verifying a system against a desired safety property under certa...
The rapid growth of computer technology and innovation has played a significant role in the rise of ...
This paper examines the errors committed by human operators of large networks and systems. It propos...
Abstract: This paper discusses that human-centered automation for traffic safety can vary depending ...
Human Systems Integration investigates human strengths and weaknesses from a body of growing knowled...
In this paper, we argue that human-factors studies are critical in building a wide range of dependab...
Edited by C.W. JohnsonInternational audienceThe increasing complexity of many computer-controlled ap...
An abstract quantitative model of a Human Computer Interface is introduced in order to evaluate the ...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
In this paper we put forward an approach to deriving and applying human error tolerance requirements...
Abstract: Classically, humans have been perceived as a source of faults in systems. Modern ergonomic...
In this paper we provide a conceptual model useful for describing the cyclic interactions of a compu...
There continue to be numerous breaches publicised pertaining to cybersecurity despite security pract...
This paper will show in detail the differences between safety and security. An argument is made for ...
Human operators are unique in their decision making capability, judgment and nondeterminism. Their s...
A safety verification task involves verifying a system against a desired safety property under certa...
The rapid growth of computer technology and innovation has played a significant role in the rise of ...
This paper examines the errors committed by human operators of large networks and systems. It propos...
Abstract: This paper discusses that human-centered automation for traffic safety can vary depending ...
Human Systems Integration investigates human strengths and weaknesses from a body of growing knowled...
In this paper, we argue that human-factors studies are critical in building a wide range of dependab...
Edited by C.W. JohnsonInternational audienceThe increasing complexity of many computer-controlled ap...
An abstract quantitative model of a Human Computer Interface is introduced in order to evaluate the ...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
In this paper we put forward an approach to deriving and applying human error tolerance requirements...
Abstract: Classically, humans have been perceived as a source of faults in systems. Modern ergonomic...
In this paper we provide a conceptual model useful for describing the cyclic interactions of a compu...
There continue to be numerous breaches publicised pertaining to cybersecurity despite security pract...
This paper will show in detail the differences between safety and security. An argument is made for ...