{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:13:32Z","timestamp":1726035212779},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030248536"},{"type":"electronic","value":"9783030248543"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24854-3_4","type":"book-chapter","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T11:03:21Z","timestamp":1562151801000},"page":"47-63","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Failure and Change Impact Analysis for Safety-Critical Systems"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Lohm\u00fcller","sequence":"first","affiliation":[]},{"given":"Julia","family":"Rauscher","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Bauer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,4]]},"reference":[{"key":"4_CR1","unstructured":"SESAMO Project (2015). \n                    http:\/\/sesamo-project.eu\/\n                    \n                  . Accessed 31 Jan"},{"key":"4_CR2","volume-title":"Zuverl\u00e4ssigkeit mechatronischer Systeme, Grundlagen und Bewertungen in fr\u00fchen Entwicklungsphasen","author":"B Bertsche","year":"2009","unstructured":"Bertsche, B., G\u00f6hner, P., Jensen, U., Schink\u00f6the, W., Wunderlich, H.J.: Zuverl\u00e4ssigkeit mechatronischer Systeme, Grundlagen und Bewertungen in fr\u00fchen Entwicklungsphasen. Springer, Heidelberg (2009)"},{"key":"4_CR3","unstructured":"Bundesverwaltungsamt: Fehlerm\u00f6glichkeits- und einflussanalyse (FMEA). Organisationshandbuch (2017)"},{"issue":"5","key":"4_CR4","doi-asserted-by":"publisher","first-page":"2227","DOI":"10.1109\/TII.2017.2695583","volume":"13","author":"B Cai","year":"2017","unstructured":"Cai, B., Huang, L., Xie, M.: Bayesian networks in fault diagnosis. IEEE Trans. Ind. Inform. 13(5), 2227\u20132240 (2017). \n                    https:\/\/doi.org\/10.1109\/TII.2017.2695583","journal-title":"IEEE Trans. Ind. Inform."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Hanemann, A., Schmitz, D., Sailer, M.: A framework for failure impact analysis and recovery with respect to service level agreements. In: 2005 IEEE International Conference on Services Computing (SCC 2005), vol. 1 (2005)","DOI":"10.1109\/SCC.2005.10"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-642-01247-1_35","volume-title":"Service-Oriented Computing \u2013 ICSOC 2008 Workshops","author":"O Holschke","year":"2009","unstructured":"Holschke, O., N\u00e4rman, P., Flores, W.R., Eriksson, E., Sch\u00f6nherr, M.: Using enterprise architecture models and Bayesian belief networks for failure impact analysis. In: Feuerlicht, G., Lamersdorf, W. (eds.) ICSOC 2008. LNCS, vol. 5472, pp. 339\u2013350. Springer, Heidelberg (2009). \n                    https:\/\/doi.org\/10.1007\/978-3-642-01247-1_35"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology. IEEE (2012)","DOI":"10.1109\/FIT.2012.53"},{"key":"4_CR8","volume-title":"Bayesian Networks: An Introduction","author":"T Koski","year":"2011","unstructured":"Koski, T., Noble, J.: Bayesian Networks: An Introduction, vol. 924. Wiley, Hoboken (2011)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-24249-1_18","volume-title":"Computer Safety, Reliability, and Security","author":"E Kristen","year":"2015","unstructured":"Kristen, E., Althammer, E.: FlexRay robustness testing contributing to automated safety certification. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 201\u2013211. Springer, Cham (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-24249-1_18"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-20052-1_2","volume-title":"Business Modeling and Software Design","author":"M Langermeier","year":"2015","unstructured":"Langermeier, M., Saad, C., Bauer, B.: Adaptive approach for impact analysis in enterprise architectures. In: Shishkov, B. (ed.) BMSD 2014. LNBIP, vol. 220, pp. 22\u201342. Springer, Cham (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-20052-1_2"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Lohm\u00fcller, P., Bauer, B.: Software product line engineering for safety-critical systems. In: Proceedings of the 7th International Conference on Model-Driven Engineering and Software Development - Volume 1: MODELSWARD, Prague, Czech Republic (2019). \n                    https:\/\/doi.org\/10.5220\/0007246102110218","DOI":"10.5220\/0007246102110218"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Lohm\u00fcller, P., Fendt, A., Bauer, B.: Multi-concerns engineering for safety-critical systems. In: Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development - Volume 1: MODELSWARD, Funchal, Portugal (2018). \n                    https:\/\/doi.org\/10.5220\/0006631705040510","DOI":"10.5220\/0006631705040510"},{"key":"4_CR13","unstructured":"Microsoft: Azure IoT reference architecture - version 2.0. Download Center (2018)"},{"key":"4_CR14","volume-title":"Learning Bayesian Networks","author":"RE Neapolitan","year":"2004","unstructured":"Neapolitan, R.E., et al.: Learning Bayesian Networks, vol. 38. Pearson Prentice Hall, Upper Saddle River (2004)"},{"key":"4_CR15","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-57222-2_6","volume-title":"Business Modeling and Software Design","author":"J Rauscher","year":"2017","unstructured":"Rauscher, J., Langermeier, M., Bauer, B.: Classification and definition of an enterprise architecture analyses language. In: Shishkov, B. (ed.) BMSD 2016. LNBIP, vol. 275, pp. 119\u2013139. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-57222-2_6"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Ren, X., Shah, F., Tip, F., Ryder, B.G., Chesley, O.: Chianti: a tool for change impact analysis of java programs. In: Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications, pp. 432\u2013448 (2004)","DOI":"10.1145\/1028976.1029012"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.ress.2014.10.006","volume":"134","author":"J Shin","year":"2015","unstructured":"Shin, J., Son, H., Heo, G., et al.: Development of a cyber security risk model using bayesian networks. Reliability Eng. Syst. Safety 134, 208\u2013217 (2015)","journal-title":"Reliability Eng. Syst. Safety"},{"key":"4_CR18","volume-title":"Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents","author":"J Viega","year":"2001","unstructured":"Viega, J., McGraw, G.R.: Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents. Pearson Education, Essex (2001)"},{"key":"4_CR19","unstructured":"Yu, Y.: Germanwings flight 4u9525: a victim of the deadlock between safety and security demands (2015). \n                    http:\/\/theconversation.com\/germanwings-flight-4u9525-a-victim-of-the-deadlock-between-safety-and-security-demands-39386\n                    \n                  . Accessed 3 May 2019"}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24854-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T11:05:30Z","timestamp":1562151930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24854-3_4"}},"subtitle":["Applied on a Medical Use Case"],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030248536","9783030248543"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24854-3_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"4 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BMSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Business Modeling and Software Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bmsd2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.is-bmsd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}