{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T19:00:05Z","timestamp":1774378805638,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540664888","type":"print"},{"value":"9783540482499","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48249-0_40","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:13:11Z","timestamp":1269897191000},"page":"468-480","source":"Crossref","is-referenced-by-count":46,"title":["The Integration of Safety and Security Requirements"],"prefix":"10.1007","author":[{"given":"David Peter","family":"Eames","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Moffett","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,14]]},"reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Leveson, N., G.: Software Safety: Why, What and How. In: ACM Computing Surveys, Vol. 18, No. 2 (1986).","DOI":"10.1145\/7474.7528"},{"key":"40_CR2","unstructured":"Pfleeger, C., P.: Security in Computing. Prentice Hall Inc (1997)."},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Avizienis, A., Laprie, J. C. (eds.): Dependable Computing for Critical Applications. Springer-Verlag\/Wien (1991).","DOI":"10.1007\/978-3-7091-9123-1"},{"key":"40_CR4","unstructured":"McDermid, J., A.: On Dependibility, its Measurement and its Management. In: High Integrity Systems, Vol. 1, No. 1 (1994)."},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Sanders, W., E., Meyer, J., F.: A Unified Approach to Specifying Measures of Performance, Dependability and Performability. In Dependable Computing for Critical Systems. Springer-Verlag\/Wien (1991).","DOI":"10.1007\/978-3-7091-9123-1_10"},{"key":"40_CR6","unstructured":"Cullyer, J.: The Technology of Safety and Security. In: The Computer Bulletin, Vol. 5, No. 5 (1993)."},{"key":"40_CR7","unstructured":"Rushby, J.: Critical Properties; Survey and Taxonomy. In: Reliability Engineering and System Safety, Vol. 43, (1994)."},{"key":"40_CR8","unstructured":"Brewer, D. F. C.: Applying Security Techniques to Achieve Safety. In: Directions in Safety-Critical Systems, Proceedings of the Safety-Critical Systems Symposium, Bristol 1993. Springer-Verlag London Ltd (1993)."},{"key":"40_CR9","unstructured":"Leveson, N., G.: Safeware, System Safety and Computers. Addison-Wesley Publishing Company Inc (1996)."},{"key":"40_CR10","unstructured":"CESG.: CESG INFOSEC Memorandum Number 5-System Security Policies, Issue 3.0 (July 1994)."},{"key":"40_CR11","unstructured":"CESG.: CESG COMPUSEC Memorandum No 10-Minimum Computer Security Standards for HMG Information Handled by Information Technology Systems, Issue 2.2, (October 1996)."},{"key":"40_CR12","unstructured":"UK Ministry of Defence: Defence Standard 00-56\/Issue 2 (DS 00-56\/2), Safety Management Requirements for Defence Systems, dated 13 December 1996 (1996)."},{"key":"40_CR13","unstructured":"Department of Defense Trusted Computer System Evaluation Criteria. US Department of Defense (1985)."},{"key":"40_CR14","unstructured":"Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model, Common Criteria Implementation Board. CCIB (96\/011) (1996)."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48249-0_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T19:01:36Z","timestamp":1558983696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48249-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664888","9783540482499"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-48249-0_40","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}