000 | 03313nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-319-28905-2 | ||
003 | DE-He213 | ||
005 | 20220801215007.0 | ||
007 | cr nn 008mamaa | ||
008 | 160122s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319289052 _9978-3-319-28905-2 |
||
024 | 7 |
_a10.1007/978-3-319-28905-2 _2doi |
|
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTEC009000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
100 | 1 |
_aGumzej, Roman. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _941687 |
|
245 | 1 | 0 |
_aEngineering Safe and Secure Cyber-Physical Systems _h[electronic resource] : _bThe Specification PEARL Approach / _cby Roman Gumzej. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXIII, 128 p. 28 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Computational Intelligence, _x1860-9503 ; _v632 |
|
505 | 0 | _aIntroduction -- Specification PEARL Language -- Specification PEARL Methodology -- UML 2 Profile for Specification PEARL.-UML Safety Pattern for Specification PEARL -- Specification PEARL Security -- Evaluation of the Methodology -- Conclusion. | |
520 | _aThis book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels. | ||
650 | 0 |
_aComputational intelligence. _97716 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 1 | 4 |
_aComputational Intelligence. _97716 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aElectronic Circuits and Systems. _941688 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
710 | 2 |
_aSpringerLink (Online service) _941689 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319289038 |
776 | 0 | 8 |
_iPrinted edition: _z9783319289045 |
776 | 0 | 8 |
_iPrinted edition: _z9783319804545 |
830 | 0 |
_aStudies in Computational Intelligence, _x1860-9503 ; _v632 _941690 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-28905-2 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c76989 _d76989 |