Engineering safe and secure cyber-physical systems: the specification PEARL approach
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2016]
|
Schriftenreihe: | Studies in computational intelligence
volume 632 (2016) |
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 Volltext Abstract Inhaltsverzeichnis |
Beschreibung: | 1 Online Ressource (xiii, 128 Seiten) |
ISBN: | 9783319289052 |
DOI: | 10.1007/978-3-319-28905-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043408086 | ||
003 | DE-604 | ||
005 | 20160926 | ||
007 | cr|uuu---uuuuu | ||
008 | 160225s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319289052 |c Online |9 978-3-319-28905-2 | ||
024 | 7 | |a 10.1007/978-3-319-28905-2 |2 doi | |
035 | |a (OCoLC)936855985 | ||
035 | |a (DE-599)BVBBV043408086 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1043 |a DE-Aug4 |a DE-898 |a DE-573 |a DE-859 |a DE-863 |a DE-634 |a DE-92 |a DE-862 |a DE-861 |a DE-706 | ||
082 | 0 | |a 006.3 |2 23 | |
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
100 | 1 | |a Gumzej, Roman |e Verfasser |0 (DE-588)108463919X |4 aut | |
245 | 1 | 0 | |a Engineering safe and secure cyber-physical systems |b the specification PEARL approach |c Roman Gumzej |
264 | 1 | |a Cham |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online Ressource (xiii, 128 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Studies in computational intelligence |v volume 632 (2016) | |
650 | 4 | |a Engineering | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Quality control | |
650 | 4 | |a Reliability | |
650 | 4 | |a Industrial safety | |
650 | 4 | |a Electronic circuits | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Circuits and Systems | |
650 | 4 | |a Quality Control, Reliability, Safety and Risk | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Künstliche Intelligenz | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-28903-8 |
830 | 0 | |a Studies in computational intelligence |v volume 632 (2016) |w (DE-604)BV020822171 |9 632 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-28905-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826432&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826432&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028826432 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28905-2 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 612527 |
---|---|
_version_ | 1806179691967545344 |
adam_text | ENGINEERING SAFE AND SECURE CYBER-PHYSICAL SYSTEMS
/ GUMZEJ, ROMAN
: 2016
ABSTRACT / INHALTSTEXT
THIS BOOK INTRODUCES THE CONCEPT OF HOLISTIC DESIGN AND DEVELOPMENT OF
CYBER PHYSICAL SYSTEMS TO ACHIEVE THEIR SAFE AND SECURE OPERATION. IT
SHOWS THAT BY FOLLOWING THE STANDARDS FOR EMBEDDED SYSTEM’S SAFETY AND
USING APPROPRIATE HARDWARE AND SOFTWARE COMPONENTS INHERENTLY SAFE
SYSTEM’S ARCHITECTURES CAN BE DEVISED AND CERTIFIED. WHILE THE
STANDARDS ALREADY ENABLE TESTING AND CERTIFICATION OF INHERENTLY SAFE
AND SOUND HARDWARE, THIS IS STILL NOT THE CASE WITH SOFTWARE. THE BOOK
DEMONSTRATES THAT SPECIFICATION PEARL(SPEARL) ADDRESSES THIS ISSUE AND
PROPOSES APPROPRIATE SOLUTIONS FROM THE VIEWPOINTS OF SOFTWARE
ENGINEERING AS WELL AS CONCRETE PROGRAM COMPONENTS. BY DOING SO IT
REDUCES THE COMPLEXITY OF CYBER PHYSICAL SYSTEMS DESIGN IN AN INNOVATIVE
WAY. THREE ULTIMATE GOALS ARE BEING FOLLOWED IN THE COURSE OF DEFINING
THIS NEW PEARL STANDARD, NAMELY: 1. SIMPLICITY OVER COMPLEXITY, 2.
INHERENT REAL-TIME ABILITY, AND 3. CONFORMITY TO SAFETY INTEGRITY AND
SECURITY CAPABILITY LEVELS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ENGINEERING SAFE AND SECURE CYBER-PHYSICAL SYSTEMS
/ GUMZEJ, ROMAN
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
SPECIFICATION PEARL LANGUAGE
SPECIFICATION PEARL METHODOLOGY
UML 2 PROFILE FOR SPECIFICATION PEARL.-UML SAFETY PATTERN FOR
SPECIFICATION PEARL
SPECIFICATION PEARL SECURITY
EVALUATION OF THE METHODOLOGY
CONCLUSION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Gumzej, Roman |
author_GND | (DE-588)108463919X |
author_facet | Gumzej, Roman |
author_role | aut |
author_sort | Gumzej, Roman |
author_variant | r g rg |
building | Verbundindex |
bvnumber | BV043408086 |
classification_rvk | ST 300 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)936855985 (DE-599)BVBBV043408086 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-28905-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03588nmm a2200697zcb4500</leader><controlfield tag="001">BV043408086</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160926 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160225s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319289052</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-28905-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-28905-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)936855985</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043408086</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gumzej, Roman</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)108463919X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Engineering safe and secure cyber-physical systems</subfield><subfield code="b">the specification PEARL approach</subfield><subfield code="c">Roman Gumzej</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (xiii, 128 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">volume 632 (2016)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Reliability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic circuits</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Circuits and Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quality Control, Reliability, Safety and Risk</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-28903-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">volume 632 (2016)</subfield><subfield code="w">(DE-604)BV020822171</subfield><subfield code="9">632</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826432&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826432&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028826432</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28905-2</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043408086 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:13:02Z |
institution | BVB |
isbn | 9783319289052 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028826432 |
oclc_num | 936855985 |
open_access_boolean | |
owner | DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-861 DE-706 |
owner_facet | DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-92 DE-862 DE-BY-FWS DE-861 DE-706 |
physical | 1 Online Ressource (xiii, 128 Seiten) |
psigel | ZDB-2-ENG ZDB-2-ENG_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Studies in computational intelligence |
series2 | Studies in computational intelligence |
spellingShingle | Gumzej, Roman Engineering safe and secure cyber-physical systems the specification PEARL approach Studies in computational intelligence Engineering Artificial intelligence Computational intelligence Quality control Reliability Industrial safety Electronic circuits Computational Intelligence Artificial Intelligence (incl. Robotics) Circuits and Systems Quality Control, Reliability, Safety and Risk Ingenieurwissenschaften Künstliche Intelligenz |
title | Engineering safe and secure cyber-physical systems the specification PEARL approach |
title_auth | Engineering safe and secure cyber-physical systems the specification PEARL approach |
title_exact_search | Engineering safe and secure cyber-physical systems the specification PEARL approach |
title_full | Engineering safe and secure cyber-physical systems the specification PEARL approach Roman Gumzej |
title_fullStr | Engineering safe and secure cyber-physical systems the specification PEARL approach Roman Gumzej |
title_full_unstemmed | Engineering safe and secure cyber-physical systems the specification PEARL approach Roman Gumzej |
title_short | Engineering safe and secure cyber-physical systems |
title_sort | engineering safe and secure cyber physical systems the specification pearl approach |
title_sub | the specification PEARL approach |
topic | Engineering Artificial intelligence Computational intelligence Quality control Reliability Industrial safety Electronic circuits Computational Intelligence Artificial Intelligence (incl. Robotics) Circuits and Systems Quality Control, Reliability, Safety and Risk Ingenieurwissenschaften Künstliche Intelligenz |
topic_facet | Engineering Artificial intelligence Computational intelligence Quality control Reliability Industrial safety Electronic circuits Computational Intelligence Artificial Intelligence (incl. Robotics) Circuits and Systems Quality Control, Reliability, Safety and Risk Ingenieurwissenschaften Künstliche Intelligenz |
url | https://doi.org/10.1007/978-3-319-28905-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826432&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826432&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV020822171 |
work_keys_str_mv | AT gumzejroman engineeringsafeandsecurecyberphysicalsystemsthespecificationpearlapproach |