{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:29:26Z","timestamp":1725467366732},"publisher-location":"Boston","reference-count":13,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402077769"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-23484-5_1","type":"book-chapter","created":{"date-parts":[[2006,7,17]],"date-time":"2006-07-17T09:56:37Z","timestamp":1153130197000},"page":"3-12","source":"Crossref","is-referenced-by-count":1,"title":["How can we justify trust in software based systems?"],"prefix":"10.1007","author":[{"given":"Janusz","family":"G\u00f3rski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"European Workshop on Industrial Computer Systems, Technical Committee 7 http:\/\/www.ewics.org\/"},{"key":"1_CR2","unstructured":"IEC61508:1998 and 2000, part 1 to 7: Functional Safety of Electrical, Electronic and Programmable Electronic Systems"},{"key":"1_CR3","unstructured":"EU EUREKA SHIP (Safety of Hazardous Industrial Processes) Project http:\/\/www.csr.city.ac.uk\/csr_city\/projects\/ship\/ship.html"},{"key":"1_CR4","unstructured":"G\u00f3rski J., \u2018Developing Safety Cases for Software Intensive Systems\u2019, Proc. Conf. on Risk Analysis and Safety Management of Technical Systems, Gdansk, 25\u201327 June, 2001, pp. 111\u2013120"},{"key":"1_CR5","volume-title":"Technical Committee","author":"European Workshop on Industrial Computer Systems","year":"2003","unstructured":"EWICS TC7 (European Workshop on Industrial Computer Systems, Technical Committee 7) Medical Devices Subgroup, Edinbourgh, UK, 23 September, 2003"},{"key":"1_CR6","unstructured":"Safety Case Assessment Criteria http:\/\/www.hse.gov.uk\/railway\/criteria\/"},{"key":"1_CR7","unstructured":"Common Methodology for Information Technology Security Evaluation, version 1.0, 1999"},{"key":"1_CR8","unstructured":"Common Criteria for Information Technology Security Evaluation version 2.1, 1999 (Parts 1,2,3)"},{"key":"1_CR9","unstructured":"ISO\/ IEC Information Security Management, 2000"},{"key":"1_CR10","unstructured":"Trust Case Development, WP11 Report, Project IST DRIVE (Drugs In Virtual Enterprise), Dl1.1\u20133, January 2003"},{"key":"1_CR11","unstructured":"Eriksson, H.-E., Penker, M.: Business Modeling with UML, J. Wiley, 2000"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"G\u00f3rski J., Jarz\u0119bowicz A., Leszczyna R, Miler J., Olszewski M., \u2018An approach to trust case development\u2019, LNCS 2788, Springer-Verlag, 2003, pp. 193\u2013206","DOI":"10.1007\/978-3-540-39878-3_16"},{"key":"1_CR13","unstructured":"R. Bloomfield, J. Gorski, B. Bibb, \u2018Cases Discussion\u2019, EWICS Medical Workshop, Edinbourgh, UK, September 2003"}],"container-title":["Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-23484-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T04:42:58Z","timestamp":1619498578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-23484-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402077769"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/0-387-23484-5_1","relation":{},"subject":[]}}