{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:14:10Z","timestamp":1743077650117,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030262495"},{"type":"electronic","value":"9783030262501"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-26250-1_2","type":"book-chapter","created":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T19:02:43Z","timestamp":1567364563000},"page":"16-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Modelling Approach for System Life Cycles Assurance"],"prefix":"10.1007","author":[{"given":"Shuji","family":"Kinoshita","sequence":"first","affiliation":[]},{"given":"Yoshiki","family":"Kinoshita","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Takeyama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,9]]},"reference":[{"key":"2_CR1","unstructured":"ISO, IEC and IEEE: ISO\/IEC\/IEEE 15288:2015 Systems and software engineering - System life cycle processes (2015)"},{"key":"2_CR2","unstructured":"ISO, IEC and IEEE: ISO\/IEC\/IEEE 24748\u20131:2018 Systems and software engineering - Life cycle management - Part 1: Guidelines for life cycle management (2018)"},{"key":"2_CR3","volume-title":"Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use","author":"K Jensen","year":"2013","unstructured":"Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use, vol. 1. Springer, Heidelberg (2013)"},{"key":"2_CR4","volume-title":"Open Systems dependability\u2014Dependability Engineering for Ever-Changing Systems","year":"2015","unstructured":"Tokoro, M. (ed.): Open Systems dependability\u2014Dependability Engineering for Ever-Changing Systems, 2nd edn. CRC Press, Boca Raton (2015)","edition":"2"},{"key":"2_CR5","unstructured":"IEC: IEC 62853 Open systems dependability (2018)"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.is.2015.02.007","volume":"54","author":"LT Ly","year":"2015","unstructured":"Ly, L.T., et al.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inform. Syst. 54, 209\u2013234 (2015)","journal-title":"Inform. Syst."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Governatori, G.: The regorous approach to process compliance. In: 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop. IEEE (2015)","DOI":"10.1109\/EDOCW.2015.28"},{"issue":"3","key":"2_CR8","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s10796-015-9558-1","volume":"18","author":"M Hashmi","year":"2016","unstructured":"Hashmi, M., Governatori, G., Wynn, M.T.: Normative requirements for regulatory compliance: an abstract formal framework. Inform. Syst. Front. 18(3), 429\u2013455 (2016)","journal-title":"Inform. Syst. Front."},{"key":"2_CR9","unstructured":"Casterallnos Ardila, J.P., Gallina, B.: Formal contract logic based patterns for facilitating compliance checking against ISO 26262. In: 1st Workshop on Technologies for Regulatory Compliance, pp. 65\u2013722 (2017)"},{"key":"2_CR10","unstructured":"Simon, E., Stoffel, K.: State machines and petri nets as a formal representation for systems life cycle management. In: Proceedings of IADIS International Conference Information Systems, pp. 275\u2013272. IADIS Press, Barcelona (2009)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-19589-1_1","volume-title":"Web Services and Formal Methods","author":"R Hull","year":"2011","unstructured":"Hull, R., et al.: Introducing the guard-stage-milestone approach for specifying business entity lifecycles. In: Bravetti, M., Bultan, T. (eds.) WS-FM 2010. LNCS, vol. 6551, pp. 1\u201324. Springer, Heidelberg (2011). \n                      https:\/\/doi.org\/10.1007\/978-3-642-19589-1_1"},{"key":"2_CR12","unstructured":"Petri, C.A.: Kommunikation mit Automaten. Schriften des Institut f\u00fcr Instrumentelle Mathematik. Universit\u00e4t Bonn (1962)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Heijstek, W., Chaudron, M.: Evaluating rup software development processes through visualization of effort distribution. In: 2008 34th Euromicro Conference Software Engineering and Advanced Applications. IEEE (2008)","DOI":"10.1109\/SEAA.2008.43"},{"key":"2_CR14","first-page":"205","volume-title":"Assuring the Safety of Systems","author":"Y Kinoshita","year":"2013","unstructured":"Kinoshita, Y., Takeyama, M.: Assurance case as a proof in a theory\u2014towards formulation of rebuttals. In: Dale, C., Anderson, T. (eds.) Assuring the Safety of Systems, pp. 205\u2013230. SCSC, Greenville (2013)"},{"key":"2_CR15","series-title":"Studies in Proof Theory","volume-title":"Intuitionistic Type Theory","author":"P Martin-L\u00f6f","year":"1984","unstructured":"Martin-L\u00f6f, P.: Intuitionistic Type Theory. Studies in Proof Theory, vol. 1. Bibliopolis, Naple (1984). Notes by Giovanni Sambin"},{"key":"2_CR16","unstructured":"ISO, IEC and IEEE: ISO\/IEC\/IEEE 15289:2017 Systems and software engineering - content of life-cycle information items (documentation) (2017)"},{"key":"2_CR17","unstructured":"Agda Team: The Agda Wiki. \n                      https:\/\/wiki.portal.chalmers.se\/agda\/pmwiki.php\n                      \n                    . Accessed 10 June 2019"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26250-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T16:57:33Z","timestamp":1572454653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-26250-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030262495","9783030262501"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26250-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turku","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Finland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.ncl.ac.uk\/safecomp2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}