{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:43:42Z","timestamp":1725497022843},"edition-number":"1","reference-count":26,"publisher":"Wiley","isbn-type":[{"type":"print","value":"9780471383932"},{"type":"electronic","value":"9780470050118"}],"license":[{"start":{"date-parts":[[2009,3,16]],"date-time":"2009-03-16T00:00:00Z","timestamp":1237161600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Software systems today control every aspect of our daily lives from banking and airline reservation systems, to power grids and air traffic control systems, to online shopping. Proliferation of complex software systems around the world, connected via networks, creates the expectations that these systems must be trusted; that they must be available when needed; that they must perform their duties correctly; that they must be safe to use; and that they must protect sensitive information embedded within them. Simply put, these software systems must be dependable.<\/jats:p>","DOI":"10.1002\/9780470050118.ecse381","type":"other","created":{"date-parts":[[2009,3,9]],"date-time":"2009-03-09T17:48:02Z","timestamp":1236620882000},"page":"2583-2595","source":"Crossref","is-referenced-by-count":0,"title":["Software Dependability"],"prefix":"10.1002","author":[{"given":"Roshanak","family":"Roshandel","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2009,3,16]]},"reference":[{"key":"e_1_2_9_2_1_1","unstructured":"P. B.Lakey andA.Neufelder System and software reliability assurance notebook Rome Laboratory Report 1997."},{"key":"e_1_2_9_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_2_9_2_3_1","unstructured":"IEEE Standards Association: Available:http:\/\/standards.ieee.org\/."},{"volume-title":"Software Engineering","year":"2006","author":"Sommerville I.","key":"e_1_2_9_2_4_1"},{"key":"e_1_2_9_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2005.1502528"},{"key":"e_1_2_9_2_6_1","unstructured":"Mars Climate Orbiter Official Website Available:http:\/\/mars.jpl.nasa.gov\/msp98\/news\/mco990930.html."},{"volume-title":"Safeware: System Safety and Computer","year":"2005","author":"Leveson N.","key":"e_1_2_9_2_7_1"},{"key":"e_1_2_9_2_8_1","unstructured":"Information on the Misadministrations in Panama Bureau of Radiation Control Florida Department of Health 2001."},{"key":"e_1_2_9_2_9_1","doi-asserted-by":"crossref","unstructured":"B.Littlewood andL.Strigini Software reliability and dependability: A roadmap Proc. International Conference on Software Engineering \u2010 Future of SE Track 2000:175\u2013188.","DOI":"10.1145\/336512.336551"},{"volume-title":"The Mythical Man\u2010Month: Essays on Software Engineering","year":"1995","author":"Brooks F.","key":"e_1_2_9_2_10_1"},{"volume-title":"Software Engineering: A Practitioner's Approach","year":"2005","author":"Pressman R. S.","key":"e_1_2_9_2_11_1"},{"key":"e_1_2_9_2_12_1","unstructured":"ISO standard Available:http:\/\/www.issco.unige.ch\/projects\/ewg96\/node13.html."},{"key":"e_1_2_9_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-295-0"},{"key":"e_1_2_9_2_14_1","unstructured":"ANSI\/IEEE Standard Glossary of Software Engineering Terminology STD\u2010729\u20101991 ANSI\/IEEE 1991."},{"key":"e_1_2_9_2_15_1","unstructured":"Reliability Maintainability and Availability (RMA) Handbook FAAHDBK\u2010006 2006.http:\/\/aero\u2010defense.ihs.com\/document\/abstract\/QMFMACAAAAAAAAAA"},{"key":"e_1_2_9_2_16_1","article-title":"Fundamental concepts of computer system dependability","author":"Randell B.","year":"2001","journal-title":"Proc. IARP\/IEEE\u2010RAS Workshop on Robot Dependability"},{"key":"e_1_2_9_2_17_1","article-title":"Achieving error\u2010free man\u2010rated software","author":"Keller T. W.","year":"1993","journal-title":"2nd Int\u201cl Software Testing, Analysis and Review Conf., Software Quality Eng."},{"key":"e_1_2_9_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.002"},{"volume-title":"Handbook of Software Reliability Engineering","year":"1996","author":"Lyu M.","key":"e_1_2_9_2_19_1"},{"volume-title":"Security in Computing","year":"2006","author":"Pfleeger C.","key":"e_1_2_9_2_20_1"},{"volume-title":"Software Security: Building Security In","year":"2006","author":"McGraw G.","key":"e_1_2_9_2_21_1"},{"volume-title":"Software Fault Tolerance Techniques and Implementation","year":"2001","author":"Pullum L.","key":"e_1_2_9_2_22_1"},{"key":"e_1_2_9_2_23_1","unstructured":"International Electrotechnical Commission Functional safety of electrical\/electronic\/programmable electronic safety\u2010related systems standard IEC 61508 Available:http:\/\/www.iec.ch\/zone\/fsafety\/fsafety_entry.htm."},{"key":"e_1_2_9_2_24_1","unstructured":"Data Encryption Standard (DES) National Institute of Standards and Technology Available:http:\/\/www.itl.nist.gov\/fipspubs\/fip46\u20102.htm."},{"key":"e_1_2_9_2_25_1","unstructured":"Defence Standard \u2010 0056 Safety Management Requirements for Defence Systems 1996 Available:http:\/\/www.rcm2.co.uk\/safety%20&%20reliability\/def\u20100056.htm."},{"key":"e_1_2_9_3_2_1","unstructured":"IFIP WG10.4 on Dependable Computing and Fault Tolerance Available:http:\/\/www.dependability.org\/"}],"container-title":["Wiley Encyclopedia of Computer Science and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9780470050118.ecse381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T05:51:23Z","timestamp":1710136283000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/9780470050118.ecse381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,16]]},"ISBN":["9780471383932","9780470050118"],"references-count":26,"alternative-id":["10.1002\/9780470050118.ecse381","10.1002\/9780470050118"],"URL":"https:\/\/doi.org\/10.1002\/9780470050118.ecse381","archive":["Portico"],"relation":{},"subject":[],"published":{"date-parts":[[2009,3,16]]}}}