000 03313nam a22005655i 4500
001 978-3-319-28905-2
003 DE-He213
005 20220801215007.0
007 cr nn 008mamaa
008 160122s2016 sz | s |||| 0|eng d
020 _a9783319289052
_9978-3-319-28905-2
024 7 _a10.1007/978-3-319-28905-2
_2doi
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aTEC009000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
100 1 _aGumzej, Roman.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_941687
245 1 0 _aEngineering Safe and Secure Cyber-Physical Systems
_h[electronic resource] :
_bThe Specification PEARL Approach /
_cby Roman Gumzej.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXIII, 128 p. 28 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v632
505 0 _aIntroduction -- Specification PEARL Language -- Specification PEARL Methodology -- UML 2 Profile for Specification PEARL.-UML Safety Pattern for Specification PEARL -- Specification PEARL Security -- Evaluation of the Methodology -- Conclusion.
520 _aThis book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.
650 0 _aComputational intelligence.
_97716
650 0 _aArtificial intelligence.
_93407
650 0 _aElectronic circuits.
_919581
650 0 _aSecurity systems.
_931879
650 1 4 _aComputational Intelligence.
_97716
650 2 4 _aArtificial Intelligence.
_93407
650 2 4 _aElectronic Circuits and Systems.
_941688
650 2 4 _aSecurity Science and Technology.
_931884
710 2 _aSpringerLink (Online service)
_941689
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319289038
776 0 8 _iPrinted edition:
_z9783319289045
776 0 8 _iPrinted edition:
_z9783319804545
830 0 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v632
_941690
856 4 0 _uhttps://doi.org/10.1007/978-3-319-28905-2
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c76989
_d76989