74,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
37 °P sammeln
  • Gebundenes Buch

This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system's safety and using appropriate hardware and software components inherently safe system's architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the…mehr

Produktbeschreibung
This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system's safety and using appropriate hardware and software components inherently safe system's architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way.

Three ultimate goals are being followed in the course of defining this new PEARL standard, namely:

1. simplicity over complexity,

2. inherent real-time ability, and

3. conformity to safety integrity and security capability levels.

Rezensionen
"With the methodology proposed, the author succeeds in linking hardware and software properties through a holistic approach, covering important aspects such as functional correctness, timeliness, safety, and security. This is a suggested read for systems designers interested in the identification of viable ways to deliver, and sustain, reliable and secure CPS implementations." (Alessandro Berni, Computing Reviews, computingreviews.com, August, 2016)