{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:26Z","timestamp":1725551186157},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664888"},{"type":"electronic","value":"9783540482499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48249-0_30","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:13:11Z","timestamp":1269897191000},"page":"350-360","source":"Crossref","is-referenced-by-count":7,"title":["Hazard Analysis in Formal Specification"],"prefix":"10.1007","author":[{"given":"Kaisa","family":"Sere","sequence":"first","affiliation":[]},{"given":"Elena","family":"Troubitsyna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,14]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"J.-R. Abrial. The B-Book: Assigning Programs to Meanings. Cambridge University Press, 1996.","DOI":"10.1017\/CBO9780511624162"},{"key":"30_CR2","series-title":"Lect Notes Comput Sci","first-page":"67","volume-title":"Stepwise Refinement of Distributed Systems","author":"R. J. R. Back","year":"1989","unstructured":"R. J. R. Back. Refinement calculus, Part II: Parallel and reactive programs. In J. W. de Bakker, W.-P. de Roever, and G. Rozenberg, editors, Stepwise Refinement of Distributed Systems, volume 430 of Lecture Notes in Computer Science, pages 67\u201393, Mook, The Netherlands, May\/June 1989. Springer-Verlag, 1990."},{"key":"30_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Proc. of CONCUR94, Sweden, August 1994","author":"R. J. R. Back","year":"1994","unstructured":"R. J. R. Back and J. von Wright. Trace Refinement of Action Systems. In Proc. of CONCUR94, Sweden, August 1994. Lecture Notes in Computer Science. Springer-Verlag, 1994."},{"key":"30_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Formal Methods for Industrial Applications: Specifying and Programming the Steam Boiler Control","author":"M. Butler","year":"1996","unstructured":"M. Butler, E. Sekerinski, and K. Sere. An Action System Approach to the Steam Boiler Problem. In Jean-Raymond Abrial, Egon Borger and Hans Langmaack, editors, Formal Methods for Industrial Applications: Specifying and Programming the Steam Boiler Control, Lecture Notes in Computer Science Vol. 1165. Springer-Verlag, 1996."},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"S. J. Clarke and J. McDermid. Software Fault Trees and Weakest Preconditions: A Comparison and Analysis, Software Engineering Journal, July 1993.","DOI":"10.1049\/sej.1993.0028"},{"key":"30_CR6","volume-title":"A Discipline of Programming","author":"E. W. Dijkstra","year":"1976","unstructured":"E. W. Dijkstra. A Discipline of Programming. Prentice Hall International, Englewood Cliffs, N.J., 1976."},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"K. M. Hansen, A. P. Ravn and V. Stavridou. From Safety Analysis to Software Requirements. In IEEE Transactions on Software Engineering, Vol.24, No.7, July 1998","DOI":"10.1109\/32.708570"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"N. G. Leveson. Software Safety in Embedded Computer Systems. Communication ACM, Vol.34, No.2, February 1999.","DOI":"10.1145\/102792.102799"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"N. G. Leveson, S. S. Cha and T. J. Shimeall, Safety Verification of Ada Programs Using Software Fault Trees. IEEE Software, July 1991.","DOI":"10.1109\/52.300036"},{"key":"30_CR10","unstructured":"N. G. Leveson. Safeware: System Safety and Computers, Addison-Wesley, 1995."},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"N. G. Leveson, M. P. E. Heimdahl, H. Hildreth, and J. D. Reese. Requirements Specification for Process-Control Systems. In IEEE Transactions on Software Engineering, 1994.","DOI":"10.1109\/32.317428"},{"issue":"5","key":"30_CR12","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/BF01211393","volume":"4","author":"Z. Liu","year":"1992","unstructured":"Z. Liu and M. Joseph. Transformations of programs for fault-tolerance. In Formal Aspects of Computing, Vol 4, No. 5 1992, pp. 442\u2013469","journal-title":"Formal Aspects of Computing"},{"key":"30_CR13","unstructured":"A. McIver, C. C. Morgan and E. Troubitsyna. The probabilistic steam boiler: a case study in probabilistic data refinement. In Proc. of IRW\/FMP\u201998, Australia, 1998."},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"E. Sekerinski and K. Sere (Eds.). Program Development by Refinement-Case Studies Using the B Method. Springer Verlag 1998.","DOI":"10.1007\/978-1-4471-0585-5"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"E. Sekerinski and K. Sere. A Theory of Prioritizing Composition. The Computer Journal, VOL. 39, No 8, pp.701\u2013712. The British Computer Society. Oxford University Press.","DOI":"10.1093\/comjnl\/39.8.701"},{"key":"30_CR16","unstructured":"N. Storey. Safety-critical computer systems. Addison-Wesley, 1996."},{"key":"30_CR17","unstructured":"E. Troubitsyna. Refining for Safety. TUCS Technical Report No.237, February 1999."},{"key":"30_CR18","unstructured":"E. Troubitsyna. Specifying Safety-Related Hazards Formally. In Proc. of 17th International System Safety Conference, Orlando, FL USA, August 1999. To appear."},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"K. Wong and J. Joyce. Refinement of Safety-Related Hazards into Verifiable Code Assertions. In Proc. of SAFECOMP\u201998, Heidelberg, Germany, October, 1998.","DOI":"10.1007\/3-540-49646-7_27"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48249-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T18:57:05Z","timestamp":1558983425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48249-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664888","9783540482499"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-48249-0_30","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}