Research Article
On the Design Complexity of Cyberphysical Production Systems
Table 8
Synthesis and reformulation of requirements on security.
| Requirement/subrequirement | (Re)formulation | Related literature sources |
| Security 1 | The CPPS shall operate in a secure way. | [24, 36, 38, 40] | Security 1.1 | The CPPS shall not allow harmful interference from other CPSs it interacts with. | ā | Security 1.2 | The CPPS shall provide secure access to its functions and modules. | ā |
|
|