Abstract
Our society is facing considerable challenges in terms of climate change, energy efficiency, renewable energies, disease control, increasing traffic congestion, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bass, M., Christensen, C.: The future of the microprocessor business. Spectr. IEEE 39(4), 34–39 (2002). doi:10.1109/6.993786
Lee, E.A.: Cyber physical systems: design challenges. In: Proceedings of the 2008 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing, ISORC ’08, pp. 363–369. IEEE Computer Society, Washington, DC, USA (2008). doi:10.1109/ISORC.2008.25. http://dx.doi.org/10.1109/ISORC.2008.25
Adelstein, F., Gupta, S.S.L.: Fundamentals of Mobile and Pervasive Computing. McGraw-Hill Professional Engineering, McGraw-Hill (2005). http://books.google.si/books?id=IhMfAQAAIAAJ
Lee, E.A.: Computing needs time. Commun. ACM 52(5), 70–79 (2009). doi:10.1145/1506409.1506426. http://doi.acm.org/10.1145/1506409.1506426
Gumzej, R.: Real-time Systems’ Quality of Service. Springer, Dordrecht (2010)
Institution, B.S., for Standardization, I.O.: Implementation of ISO/IEC 13236: Information Technology: Quality of Service: Framework. British Standards Institution. http://books.google.si/books?id=mpkgHAAACAAJ (1996)
ANSI/ISA 99.01.01-2007: Security for industrial automation and control systems part 1: terminology, concepts, and models. http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI (2007)
ANSI/ISA 99.01.02-2009: Security for industrial automation and control systems: establishing an industrial automation and control systems security program. http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI (2009)
ANSI/ISA 99.03.03-2013: Security for industrial automation and control systems part 3–3: system security requirements and security levels. http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI (2013)
IEC TS 62443-1-1:2009, Industrial communication networks - network and system security - part 1–1: terminology, concepts and models. https://webstore.iec.ch/publication/7029 (2009)
IEC 62443-2-1:2010, Industrial communication networks - network and system security - part 2–1: establishing an industrial automation and control system security program. https://webstore.iec.ch/publication/7030 (2010)
Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ics) security. Technical Report, NIST (2011). http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.pdf
Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Comput. 36(1), 41–50 (2003)
Cárdenas, A.A., Amin, S., Sastry, S.: Research challenges for the security of control systems. In: Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC’08, pp. 6:1–6:6. USENIX Association, Berkeley, USA (2008). http://dl.acm.org/citation.cfm?id=1496671.1496677
Agha, G.: The structure and semantics of actor languages. In: de Bakker, J.W., de Roever, W.P., Rozenberg, G. (eds.) Foundations of Object-Oriented Languages, pp. 1–59. Springer, Berlin (1991)
Dietz, C.: Action diagrams. In: M. Maranzana (ed.) Proceedings of the IFAC/IFIP Workshop, 15–17 September 1997, Real-Time Programming 1997. Lyon, France, Elsevier Science 1998 (1997). http://csd.informatik.uni-oldenburg.de/pub/Papers/cd97-a.ps.gz An abstract is available on-line
Traoré, I., Sahraoui, A.: A multiformalism specification framework with statecharts and vdm. In: 22nd IFAC/IFIP Workshop on Real-Time Programming (WRTPÕ97), pp. 63–68 (1997)
Lee, I., Davidson, S., Gerber, R.: Communicating Shared Resources: A Paradigm for Integrating Real-time Specification and Implementation. GRASP LAB: General Robotics and Active Sensory Perception Laboratory. University of Pennsylvania, School of Engineering and Applied Science, Department of Computer and Information Science. http://books.google.si/books?id=_QttuAAACAAJ (1991)
Ben-Abdallah, H., Lee, I.: A graphical language for specifying and analyzing real-time systems. Integr. Comput.-Aided Eng. 5(4), 279–302 (1998). http://dl.acm.org/citation.cfm?id=1275802.1275805
Ostroff, J.: A visual toolset for the design of real-time discrete-event systems. IEEE Trans. Control Syst. Technol. 5(3), 320–337 (1997)
Shaw, A.: Communicating real-time state machines. IEEE Trans. Softw. Eng. 18(9), 805–816 (1992). http://doi.ieeecomputersociety.org/10.1109/32.159840
Balarin, F., Chiodo, M., Giusto, P., Hsieh, H., Jurecska, A., Lavagno, L., Passerone, C., Sangiovanni-Vincentelli, A., Sentovich, E., Suzuki, K., Tabbara, B. (eds.): Hardware-Software Co-design of Embedded Systems: The POLIS Approach. Kluwer Academic Publishers, Norwell (1997)
Mooney Iii, V.J., De Micheli, G.: Hardware/software co-design of run-time schedulers for real-time systems. Des. Autom. Embedded Syst. 6(1), 89–144 (2000)
OMG: Unified modeling language (uml) resource page. http://www.uml.org/ (2015)
OMG: Mda - the architecture of choice for a changing world. http://www.omg.org/mda/ (2015)
Sztipanovits, J., Karsai, G.: Model-integrated computing. Computer 30(4), 110–111 (1997). doi:10.1109/2.585163
66253, Part 1: Basic pearl. Technical Report, DIN (1981)
66253 Part 2: Full pearl. Technical Report, DIN (1982)
Frigeri, A.H., Pereira, C.E., Halang, W.A.: An object-oriented extension to pearl90. In: ISORC, pp. 265–274 (1998)
Pearl - process and experiment automation realtime language. http://www.pearl90.de/ (2014)
66253 Part 3: Pearl for distributed systems. Technical Report, DIN (1989)
Herzberg, D.: Uml-rt as a candidate for modeling embedded real-time systems in the telecommunication domain. In: France, R., Rumpe, B. (eds.) ÇUMLßÕ99- The Unified Modeling Language, Lecture Notes in Computer Science, vol. 1723, pp. 330–338. Springer, Berlin (1999). doi: 10.1007/3-540-46852-8_24. http://dx.doi.org/10.1007/3-540-46852-8_24
65A, I.S.: Functional safety of electrical/electronic/programmable electronic safety-related systems. Tech. Rep. IEC 61508, The International Electrotechnical Commission, 3, rue de Varembé, Case postale 131, CH-1211 Genève 20, Switzerland (1998)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Gumzej, R. (2016). Introduction. In: Engineering Safe and Secure Cyber-Physical Systems. Studies in Computational Intelligence, vol 632. Springer, Cham. https://doi.org/10.1007/978-3-319-28905-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-28905-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28903-8
Online ISBN: 978-3-319-28905-2
eBook Packages: EngineeringEngineering (R0)