|
|
|||
|
||||
OverviewThis book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels. Full Product DetailsAuthor: Roman GumzejPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: Softcover reprint of the original 1st ed. 2016 Volume: 632 Dimensions: Width: 15.50cm , Height: 0.80cm , Length: 23.50cm Weight: 0.454kg ISBN: 9783319804545ISBN 10: 3319804545 Pages: 128 Publication Date: 30 March 2018 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsIntroduction.- Specification PEARL Language.- Specification PEARL Methodology.- UML 2 Profile for Specification PEARL.-UML Safety Pattern for Specification PEARL.- Specification PEARL Security.- Evaluation of the Methodology.- Conclusion.ReviewsWith the methodology proposed, the author succeeds in linking hardware and software properties through a holistic approach, covering important aspects such as functional correctness, timeliness, safety, and security. This is a suggested read for systems designers interested in the identification of viable ways to deliver, and sustain, reliable and secure CPS implementations. (Alessandro Berni, Computing Reviews, computingreviews.com, August, 2016) Author InformationTab Content 6Author Website:Countries AvailableAll regions |