{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:27:07Z","timestamp":1725499627135},"publisher-location":"London","reference-count":31,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781848000995"},{"type":"electronic","value":"9781848001008"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-1-84800-100-8_3","type":"book-chapter","created":{"date-parts":[[2007,12,24]],"date-time":"2007-12-24T06:10:39Z","timestamp":1198476639000},"page":"25-41","source":"Crossref","is-referenced-by-count":3,"title":["Safety Process Improvement with POSE and Alloy"],"prefix":"10.1007","author":[{"given":"Derek","family":"Mannering","sequence":"first","affiliation":[]},{"given":"Jon G.","family":"Hall","sequence":"additional","affiliation":[]},{"given":"Lucia","family":"Rapanotti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1_Ref","unstructured":"Barnes, J. (1996). High Integrity Ada; The SPARK Approach, Addison-Wesley."},{"key":"3_CR2_Ref","volume-title":"Safe composition of real time software. HASE'05","author":"I. Bate","year":"2005","unstructured":"Bate, I. and P. Conmy (2005). Safe composition of real time software. HASE'05, Heidelberg, Germany."},{"key":"3_CR3_Ref","volume-title":"15th International Conference on Software Engineering","author":"P.-J. Courtois","year":"1997","unstructured":"Courtois, P.-J. and D. L. Parnas (1997). Documentation for Safety Critical Software. 15th International Conference on Software Engineering, Baltimore, USA."},{"key":"3_CR4_Ref","volume-title":"Safety Critical Systems Symposium","author":"M. F. da Cruz","year":"2007","unstructured":"da Cruz, M. F. and P. Raistrick (2007). AMBERS: Improving Requirements Specification Through Assertive Models and SCADE\/DOORS Integration. Safety Critical Systems Symposium, Bristol, UK."},{"key":"3_CR5_Ref","volume-title":"On the Integration of Requirements Analysis and Safety Analysis for Safety-Critical Systems","author":"R. de Lemos","year":"1998","unstructured":"de Lemos, R., A. Saeed and T. Anderson (1998). On the Integration of Requirements Analysis and Safety Analysis for Safety-Critical Systems, University of Newcastle upon Tyne, UK."},{"key":"3_CR6_Ref","volume-title":"Safety Critical Systems Symposium","author":"A. Ellis","year":"1995","unstructured":"Ellis, A. (1995). Achieving Safety in Complex Control Systems. Safety Critical Systems Symposium, Brighton, United Kingdom, Springer-Verlag."},{"key":"3_CR7_Ref","volume-title":"20th International System Safety Conference","author":"A. Gerstinger","year":"2002","unstructured":"Gerstinger, A., G. Schedl and W. Winkelbauer (2002). Safety versus Reliability: Different or Equal. 20th International System Safety Conference, Denver, Colorado, USA, System Safety Society."},{"key":"3_CR8_Ref","volume-title":"10th IEEE Int. Sym. on High Assurance Systems Engineering (HASE 2007)","author":"J. G. Hall","year":"2007a","unstructured":"Hall, J. G., D. Mannering and L. Rapanotti (2007a). Arguing safety with Problem Oriented Software Engineering. 10th IEEE Int. Sym. on High Assurance Systems Engineering (HASE 2007), Dallas, Texas."},{"key":"3_CR9_Ref","volume-title":"5th IEEE Int. Conference on Software Engineering and Formal Methods (SEFM 2007)","author":"J. G. Hall","year":"2007b","unstructured":"Hall, J. G., L. Rapanotti and M. Jackson (2007b). Problem Oriented Software Engineering: A design-theoretic framework for software engineering. 5th IEEE Int. Conference on Software Engineering and Formal Methods (SEFM 2007), London, UK."},{"key":"3_CR10_Ref","volume-title":"IEEE Aerospace Conference","author":"C. Heitmeyer","year":"2007","unstructured":"Heitmeyer, C. and R. Jeffords (2007). Applying a formal requirements method to three NASA systems: Lessons learned. IEEE Aerospace Conference, Big Sky, MT."},{"key":"3_CR11_Ref","unstructured":"Jackson, D. (2006). Software Abstractions Logic, Language, and Analysis, The MIT Press."},{"key":"3_CR12_Ref","volume-title":"Problem frames : analysing and structuring software development problems","author":"M. A. Jackson","year":"2001","unstructured":"Jackson, M. A. (2001). Problem frames : analysing and structuring software development problems. Harlow, Addison-Wesley."},{"key":"3_CR13_Ref","volume-title":"Introduction to Metamathematics","author":"S. Kleene","year":"1964","unstructured":"Kleene, S. (1964). Introduction to Metamathematics, Van Nostrand, Princeton."},{"key":"3_CR14_Ref","volume-title":"Safeware : system safety and computers","author":"N. Leveson","year":"1995","unstructured":"Leveson, N. (1995). Safeware : system safety and computers. Reading, Mass. ; Wokingham, Addison-Wesley."},{"key":"3_CR15_Ref","first-page":"2000","volume-title":"Proceedings of the third workshop on Formal methods in software practice 2000","author":"N. G. Leveson","year":"2000a","unstructured":"Leveson, N. G. (2000a). \"Completeness in formal specification language design for process-control systems.\" Proceedings of the third workshop on Formal methods in software practice 2000, Portland, Oregon. ACM Press: 2000."},{"issue":"1)","key":"3_CR16_Ref","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/32.825764","volume":"26","author":"N. G. Leveson","year":"2000b","unstructured":"Leveson, N. G. (2000b). \"Intent Specifications: An Approach to Building HumanCentered Specifications.\" IEEE Transactions on Software Engineering Vol. 26 ( No. 1): pp. 15-35.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"3_CR17_Ref","volume-title":"IEEE International Symposium Requirements Engineering","author":"R. R. Lutz","year":"1993","unstructured":"Lutz, R. R. (1993). Analysing Software Requirements Errors in Safety-Critical Embedded Systems. IEEE International Symposium Requirements Engineering, San Diego, California."},{"key":"3_CR18_Ref","volume-title":"Relating Safety Requirements and System Design through Problem Oriented Software Engineering","author":"D. Mannering","year":"2007a","unstructured":"Mannering, D., J. G. Hall and L. Rapanotti (2007a). Relating Safety Requirements and System Design through Problem Oriented Software Engineering. SAFECOMP 07, Nuremburg, Germany."},{"key":"3_CR19_Ref","volume-title":"Safety Process Improvement: Early Analysis and Justification","author":"D. Mannering","year":"2007b","unstructured":"Mannering, D., J. G. Hall and L. Rapanotti (2007b). Safety Process Improvement: Early Analysis and Justification. IET Safety 07, London, England."},{"key":"3_CR20_Ref","volume-title":"Towards Normal Design for Safety Critical Systems","author":"D. Mannering","year":"2007c","unstructured":"Mannering, D., J. G. Hall and L. Rapanotti (2007c). Towards Normal Design for Safety Critical Systems. FASE 07, Braga, Portugal."},{"key":"3_CR21_Ref","volume-title":"20th International System Safety Conference","author":"P. A. Martino","year":"2002","unstructured":"Martino, P. A. and C. Muniak (2002). The Role of System Safety Engineering in Product Safety. 20th International System Safety Conference, Denver, Colorado, USA, System Safety Society."},{"key":"3_CR22_Ref","unstructured":"Redmill, F. (1999). \"An introduction to the safety standard IEC61508.\" System Safety Society 35(1)."},{"key":"3_CR23_Ref","unstructured":"RTCA\/DO-178B Software Considerations in Airborne Systems and Equipment Certification."},{"key":"3_CR24_Ref","unstructured":"SAE (1996). ARP4761: Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment."},{"key":"3_CR25_Ref","unstructured":"Schneider, S. (2001). The B-method: An Introduction, Palgrave."},{"key":"3_CR26_Ref","unstructured":"Spivey, J. M. (1992). The Z-Notation - A Reference Manual, Prentice Hall."},{"key":"3_CR27_Ref","unstructured":"UK-MoD (2004). Safety Management Requirements for Defence Systems Part 1 Requirements, MoD: 44."},{"key":"3_CR28_Ref","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A. (2000). Requirements Engineering in the Year 00: A Research Perspective. ICSE'00, 22nd International Conference on Software Engineering, Limerick.","DOI":"10.1145\/337180.337184"},{"key":"3_CR29_Ref","unstructured":"Vesely, W., F. Goldberg, N. Roberts and D. Haasl (1981). Fault Tree Handbook, U.S. Nuclear Regulatory Commission."},{"key":"3_CR30_Ref","doi-asserted-by":"crossref","unstructured":"Vincenti, W. G. (1990). What Engineers Know and How They Know It: Analytical Studies from Aeronautical History, The Johns Hopkins University Press.","DOI":"10.56021\/9780801839740"},{"issue":"(1)","key":"3_CR31_Ref","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/237432.237434","volume":"VI","author":"P. Zave","year":"1997","unstructured":"Zave, P. and M. Jackson (1997). \"Four Dark Corners of Requirements Engineering.\" ACM Transactions on Software Engineering and Methodology VI((1)): 1-30.","journal-title":"ACM Transactions on Software Engineering and Methodology"}],"container-title":["Improvements in System Safety"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-84800-100-8_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T12:52:54Z","timestamp":1684155174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-84800-100-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9781848000995","9781848001008"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-1-84800-100-8_3","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}