Engineering Safe and Secure Cyber-Physical Systems (Record no. 76989)

000 -LEADER
fixed length control field 03313nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-3-319-28905-2
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801215007.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160122s2016 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319289052
-- 978-3-319-28905-2
082 04 - CLASSIFICATION NUMBER
Call Number 006.3
100 1# - AUTHOR NAME
Author Gumzej, Roman.
245 10 - TITLE STATEMENT
Title Engineering Safe and Secure Cyber-Physical Systems
Sub Title The Specification PEARL Approach /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2016.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIII, 128 p. 28 illus.
490 1# - SERIES STATEMENT
Series statement Studies in Computational Intelligence,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Specification PEARL Language -- Specification PEARL Methodology -- UML 2 Profile for Specification PEARL.-UML Safety Pattern for Specification PEARL -- Specification PEARL Security -- Evaluation of the Methodology -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-319-28905-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic circuits.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security systems.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial Intelligence.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security Science and Technology.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1860-9503 ;
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.