Bennett | Safety Aspects of Computer Control | E-Book | www.sack.de
E-Book

E-Book, Englisch, 260 Seiten, Web PDF

Bennett Safety Aspects of Computer Control


1. Auflage 2014
ISBN: 978-1-4831-4486-3
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 260 Seiten, Web PDF

ISBN: 978-1-4831-4486-3
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark



Safety Aspects of Computer Control focuses on the increased usage of computers and safety procedures for the control of their applications. The selection first elaborates on software in safety-related systems, regulatory issues, and legal liability. Topics cover product liability, liability under the contract law, liability under the law of negligence, methods of ensuring safety, some aspects of regulation of software safety, purpose and principles of regulation, and direct regulation. The book then examines standardization efforts worldwide; real-time software requirements specification and animation using extended Petri nets; and independent software verification and validation in practice. Discussions focus on verification and validation principles, organizational principles, specification language, extended Petri nets environment, history of software standards, and standardization work realized through ISO or IEC. The manuscript takes a look at design and licensing of safety-related software, fault-tolerant control for safety, and use and relevance for the development of safety-critical systems. Concerns include formal methods in the safety-critical systems life cycle, random and systematic failures, hardware and systematic failures, and software quality standards. The book is highly recommended for computer science experts and researchers interested in the safety aspects of computer control.

Bennett Safety Aspects of Computer Control jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Front Cover
;1
2;Safety Aspects of Computer Control
;4
3;Copyright Page
;5
4;Table of Contents
;6
5;Preface;8
6;Contributors;10
7;Chapter 1. Software in safety-related systems: basic concepts and concerns
;12
7.1;INTRODUCTION;12
7.2;THE CONCEPTS;13
7.3;RESEARCH DIRECTIONS;20
7.4;REFERENCES;29
8;Chapter 2. Regulatory issues
;30
8.1;INTRODUCTION;30
8.2;METHODS OF ENSURING SAFETY;30
8.3;PURPOSE AND PRINCIPLES OF REGULATION;33
8.4;DIRECT REGULATION;34
8.5;REGULATION BY LAW;39
8.6;SOME ASPECTS OF REGULATION OF SOFTWARE SAFETY;42
8.7;REFERENCES;45
9;Chapter 3. Legal liability
;46
9.1;INTRODUCTION;46
9.2;LIABILITY UNDER CONTRACT LAW;50
9.3;LIABILITY UNDER THE LAW OF NEGLIGENCE;54
9.4;PRODUCT LIABILITY;57
9.5;CONCLUSIONS;63
9.6;ACKNOWLEDGEMENTS;66
9.7;REFERENCES;66
10;Chapter 4. Standardization efforts worldwide
;67
10.1;WHY STANDARDS ARE NEEDED;67
10.2;HISTORY OF SOFTWARE STANDARDS;67
10.3;INTERNATIONAL STANDARDS ORGANIZATIONS;68
10.4;STANDARDIZATION WORK REALIZED THROUGH ISO OR IEC;72
10.5;OTHER STANDARDS PREPARED OUTSIDE ISO AND IEC;81
10.6;CONCLUSIONS;85
10.7;REFERENCES;86
11;Chapter 5.

Real-time software requirements specification and animation using extended Petri nets: theory and application ;87
11.1;WHY WE NEED A REQUIREMENTS SPECIFICATION MODEL;87
11.2;PETRI NETS MODEL;88
11.3;EXTENDED PETRI NETS MODEL;91
11.4;THE SPECIFICATION LANGUAGE;92
11.5;EXTENDED PETRI NETS ENVIRONMENT;94
11.6;AN EXAMPLE OF MODELLING WITH EXTENDED PETRI NETS;96
11.7;CONCLUSIONS;97
11.8;ACKNOWLEDGEMENTS;98
11.9;REFERENCES;98
12;Chapter 6. Independent software verification and validation in practice: methodological and managerial aspects
;99
12.1;WHAT IS IT?;99
12.2;WHEN IT IS DONE?;99
12.3;HOW IT IS DONE?;99
12.4;WHAT DOES IT INCLUDE?;100
12.5;WHAT ARE THE BENEFITS?;101
12.6;HOW DO WE KNOW IT IS NEEDED?;101
12.7;HOW MUCH TIME AND MONEY DOES IT TAKE?;102
12.8;VERIFICATION AND VALIDATION PRINCIPLES;102
12.9;ORGANIZATIONAL PRINCIPLES;103
12.10;CONCLUSIONS;105
12.11;REFERENCES;105
13;Chapter 7. Formal methods: use and relevance for thedevelopment of safety-critical systems;107
13.1;INTRODUCTION;107
13.2;THE DEVELOPMENT OF SOFTWARE FOR SAFETY-CRITICAL SYSTEMS
;109
13.3;FORMAL METHODS IN THE SAFETY-CRITICAL SYSTEMS LIFE CYCLE
;115
13.4;EXAMPLES OF FORMAL METHODS;124
13.5;STRENGTHS AND WEAKNESSES OF FORMAL METHODS;153
13.6;CONCLUSIONS;161
13.7;ACKNOWLEDGEMENTS;162
13.8;REFERENCES;163
14;Chapter 8. Use of Ada in safety-critical systems
;165
14.1;NATURE OF A SAFETY SYSTEM;165
14.2;AVOIDANCE OF DANGER;169
14.3;ROLE OF ADA;171
14.4;RESIDUAL DEFECTS;180
14.5;CERTIFICATION OF ADA SOFTWARE IN A SAFETY-RELATED SYSTEM
;188
14.6;APPENDIX: ADA-RELATED TOPICS IN HSE GUIDELINES;193
14.7;NOTE;195
14.8;ACKNOWLEDGEMENT;195
14.9;REFERENCES;195
15;Chapter 9. Fault-tolerant control for safety
;198
15.1;INTRODUCTION;198
15.2;SAFETY;199
15.3;THE NEED FOR DETECTION AND REPAIR;199
15.4;RANDOM AND SYSTEMATIC FAILURES;200
15.5;REPAIR AND FAILURE MODELLING;202
15.6;HARDWARE AND SOFTWARE;204
15.7;AVOIDANCE OF SOFTWARE FAULTS;205
15.8;TOLERANCE OF SOFTWARE FAULTS;206
15.9;HARDWARE AND SYSTEMATIC FAILURES;208
15.10;DIVERSITY;208
15.11;LIMITATIONS ON DIVERSITY;209
15.12;STANDARDS AND GUIDELINES;210
15.13;COMMERCIAL FAULT-TOLERANT SYSTEMS;210
15.14;FAULT TOLERANCE USING NON-FAULT-TOLERANT HARDWARE
;211
15.15;DEGRADATION MODES;212
15.16;THE ROLE OF SOFTWARE IN THE PROVISION OF FAULT TOLERANCE
;212
15.17;CONCLUSIONS;213
15.18;REFERENCES;215
16;Chapter 10. The problems of an industrial supplier - and how to achieve good quality
;216
16.1;WHAT IS SOFTWARE?;216
16.2;WHAT ARE THE SUPPLIERS' PROBLEMS?;217
16.3;SAFETY ANALYSIS;218
16.4;SOFTWARE STRUCTURES;222
16.5;GENERAL QUALITY STANDARDS;225
16.6;SOFTWARE QUALITY STANDARDS;226
16.7;PROJECT ORGANIZATION;227
16.8;PROJECT MODEL;227
16.9;DOCUMENTATION;230
16.10;VERIFICATION AND VALIDATION;232
16.11;IDENTIFICATION;234
16.12;FUNCTION AND SOFTWARE STRUCTURES;234
16.13;PURCHASED SOFTWARE;236
16.14;SUMMARY;237
17;Chapter 11. Design and licensing of safety-related software
;238
17.1;INTRODUCTION;238
17.2;LIFE CYCLE AND PRINCIPLES;238
17.3;STRATEGIES;241
17.4;DEVELOPMENT (DESIGN AND CODING) FOR SOFTWARE IN SAFETY-RELATED APPLICATIONS
;250
17.5;FURTHER ASPECTS;254
17.6;ACKNOWLEDGEMENTS;254
17.7;REFERENCES;254
18;Index;256



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.