{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:58:49Z","timestamp":1742986729304,"version":"3.40.3"},"publisher-location":"London","reference-count":9,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447124931"},{"type":"electronic","value":"9781447124948"}],"license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-1-4471-2494-8_16","type":"book-chapter","created":{"date-parts":[[2012,1,3]],"date-time":"2012-01-03T18:10:05Z","timestamp":1325614205000},"page":"225-235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["At the Sharp End: developing and validating Safety Critical Software"],"prefix":"10.1007","author":[{"given":"Fergus","family":"Duncan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2011,12,1]]},"reference":[{"key":"16_CR1_16","doi-asserted-by":"crossref","unstructured":"Clements P, Northrop L (2005) Software product lines, practices and patterns. Addison-Wesley","DOI":"10.1007\/978-3-540-28630-1_34"},{"key":"16_CR2_16","unstructured":"Borland (2011) Caliber requirements management tools. http:\/\/www.borland.com\/us\/products\/caliber. Accessed 19 September 2011"},{"key":"16_CR3_16","unstructured":"Goda (2011) CASE Spec. Goda Software Inc. http:\/\/www.analysttool.com. Accessed 19 September 2011"},{"key":"16_CR4_16","unstructured":"IBM (2011) DOORS requirements management tools. http:\/\/www01.ibm.com\/software\/awdtools\/doors\/productline. Accessed 19 September 2011"},{"key":"16_CR5_16","doi-asserted-by":"crossref","unstructured":"IEC (2006) Medical device software - Software lifecycle processes. IEC 62304. InternationalElectrotechnical Commission","DOI":"10.1049\/ic:20060141"},{"key":"16_CR6_16","unstructured":"IEC (2010a) Application of risk management for IT networks incorporating medical devices -Part 1: Roles, responsibility and activities. IEC80001. International Electrotechnical Commission"},{"key":"16_CR7_16","unstructured":"IEC (2010b) Functional safety of electrical\/electronic\/programmable electronic safety relatedsystems, Parts 1 to 7. ISO\/IEC 61508. International Electrotechnical Commission"},{"key":"16_CR8_16","unstructured":"ISO (2003) Medical devices - Quality management systems - Requirements for regulatory purposes. ISO13485"},{"key":"16_CR9_16","unstructured":"Verum (2011) ASD:Suite. http:\/\/www.verum.com. Accessed 19 September 2011"}],"container-title":["Achieving Systems Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-2494-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T13:44:59Z","timestamp":1742219099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-2494-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,1]]},"ISBN":["9781447124931","9781447124948"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-2494-8_16","relation":{},"subject":[],"published":{"date-parts":[[2011,12,1]]},"assertion":[{"value":"1 December 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}