{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:25:22Z","timestamp":1743139522123,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030309848"},{"type":"electronic","value":"9783030309855"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30985-5_29","type":"book-chapter","created":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T17:53:39Z","timestamp":1570557219000},"page":"502-518","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Modelling of Railway Signalling System Requirements by Controlled Natural Languages: A Case Study"],"prefix":"10.1007","author":[{"given":"Gabriele","family":"Lenzini","sequence":"first","affiliation":[]},{"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,9]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Bartolini, C., Lenzini, G., Santos, C.: An agile approach to validate a formal representation of the GDPR. In: New Frontiers in Artificial Intellingence. New Frontiers in Artificial Intelligence. Springer (2019, in press)","DOI":"10.1007\/978-3-030-31605-1_13"},{"key":"29_CR2","doi-asserted-by":"publisher","unstructured":"Basile, D., ter Beek, M.H., Ciancia, V.: Statistical model checking of a moving block railway signalling scenario with Uppaal SMC - experience and outlook. In: Leveraging Applications of Formal Methods, Verification and Validation. Verification - 8th International Symposium, ISoLA 2018, Limassol, Cyprus, 5\u20139 November 2018, Proceedings, Part II, pp. 372\u2013391 (2018). https:\/\/doi.org\/10.1007\/978-3-030-03421-4_24","DOI":"10.1007\/978-3-030-03421-4_24"},{"key":"29_CR3","doi-asserted-by":"publisher","unstructured":"Basile, D., ter Beek, M.H., Ferrari, A., Legay, A.: Modelling and analysing ERTMS L3 moving block railway signalling with simulink and Uppaal SMC. In: Formal Methods for Industrial Critical Systems - 24th International Conference, FMICS 2019, Amsterdam, The Netherlands, 30\u201331 August 2019, Proceedings (2019). https:\/\/doi.org\/10.1007\/978-3-030-27008-7_1","DOI":"10.1007\/978-3-030-27008-7_1"},{"key":"29_CR4","doi-asserted-by":"publisher","unstructured":"Caimi, C., Gambardella, C., Manea, M., Petrocchi, M., Stella, D.: Legal and technical perspectives in data sharing agreements definition. In: Privacy Technologies and Policy - Third Annual Privacy Forum, APF 2015, Luxembourg, 7\u20138 October 2015, Revised Selected Papers, pp. 178\u2013192 (2015). https:\/\/doi.org\/10.1007\/978-3-319-31456-3_10","DOI":"10.1007\/978-3-319-31456-3_10"},{"key":"29_CR5","unstructured":"Coco Cloud Consortium - Confidential and Compliant Clouds: Deliverable 4.2: First DSA management infrastructure (2015). http:\/\/www.coco-cloud.eu\/deliverables"},{"key":"29_CR6","unstructured":"Coco Cloud Consortium - Confidential and Compliant Clouds: Deliverable 4.3: Final DSA management infrastructure (2016). http:\/\/www.coco-cloud.eu\/deliverables"},{"key":"29_CR7","unstructured":"Coco Cloud Consortium - Confidential and Compliant Clouds: Deliverable 5.3: Final version of the enforcement infrastructure (2016). http:\/\/www.coco-cloud.eu\/deliverables"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Costantino, G., Martinelli, F., Matteucci, I., Petrocchi, M.: Analysis of data sharing agreements. In: Information Systems Security and Privacy, pp. 167\u2013178 (2017)","DOI":"10.5220\/0006207501670178"},{"key":"29_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-319-93354-2_8","volume-title":"Information Systems Security and Privacy","author":"G Costantino","year":"2018","unstructured":"Costantino, G., Martinelli, F., Matteucci, I., Petrocchi, M.: Efficient detection of conflicts in data sharing agreements. In: Mori, P., Furnell, S., Camp, O. (eds.) ICISSP 2017. CCIS, vol. 867, pp. 148\u2013172. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93354-2_8"},{"key":"29_CR10","unstructured":"Cregan, A., Schwitter, R., Meyer, T., et al.: Sydney OWL syntax - towards a controlled natural language syntax for OWL 1.1. In: OWL: Experiences and Directions, vol. 258. CEURs Workshop Proceedings (2007)"},{"key":"29_CR11","unstructured":"CYRAIL: Safety and security requirements of rail transport system in multi-stakeholder environment. Technical report, EU, June 2017"},{"key":"29_CR12","unstructured":"CYRail: Recommendations on cybersecurity of rail signalling and communications systems. Technical report, CYRail, September 2018"},{"key":"29_CR13","unstructured":"EEIG ERTMS Users Group: ERTMS\/ETCS RAMS Requirements Specification - Chapter 2 - RAM (1998). http:\/\/www.era.europa.eu\/Document-Register\/Documents\/B1-02s1266-.pdf"},{"key":"29_CR14","unstructured":"ENISA: Cyber Security and Resilience of Intellingent Public Transport, Good Practices and Recommendations. Technical report, ENISA, December 2015"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Ferrari, A., Lipari, G., Gnesi, S., Spagnolo, G.O.: Pragmatic ambiguity detection in natural language requirements. In: Proceedings of AIRE, pp. 1\u20138 (2014)","DOI":"10.1109\/AIRE.2014.6894849"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Ferrari, A., Spoletini, P., Gnesi, S.: Ambiguity cues in requirements elicitation interviews. In: Proceedings of RE, pp. 56\u201365 (2016)","DOI":"10.1109\/RE.2016.25"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-540-85658-0_3","volume-title":"Reasoning Web","author":"NE Fuchs","year":"2008","unstructured":"Fuchs, N.E., Kaljurand, K., Kuhn, T.: Attempto controlled English for knowledge representation. In: Baroglio, C., Bonatti, P.A., Ma\u0142uszy\u0144ski, J., Marchiori, M., Polleres, A., Schaffert, S. (eds.) Reasoning Web. LNCS, vol. 5224, pp. 104\u2013124. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85658-0_3"},{"key":"29_CR18","unstructured":"Gnesi, S., Lenzini, G., Latella, D., Abbaneo, C., Amendola, A., Marmo, P.: An automatic SPIN validation of a safety critical railway control system. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN 2000), 25\u201328 June 2000, New York, NY, USA, pp. 119\u2013124 (2002)"},{"key":"29_CR19","doi-asserted-by":"publisher","unstructured":"Gnesi, S., Petrocchi, M.: Towards an executable algebra for product lines. In: 16th International Software Product Line Conference, SPLC 2012, Salvador, Brazil, 2\u20137 September 2012, vol. 2, pp. 66\u201373 (2012). https:\/\/doi.org\/10.1145\/2364412.2364424","DOI":"10.1145\/2364412.2364424"},{"key":"29_CR20","unstructured":"Hart, G., Dolbear, C., Goodwin, J.: Lege Feliciter: using structured English to represent a topographic hydrology ontology. In: OWL: Experiences and Directions (2007)"},{"issue":"1","key":"29_CR21","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1162\/COLI_a_00168","volume":"40","author":"T Kuhn","year":"2014","unstructured":"Kuhn, T.: A survey and classification of controlled natural languages. Comput. Linguist. 40(1), 121\u2013170 (2014)","journal-title":"Comput. Linguist."},{"key":"29_CR22","doi-asserted-by":"publisher","unstructured":"Martinelli, F., Matteucci, I., Petrocchi, M., Wiegand, L.: A formal support for collaborative data sharing. In: Multidisciplinary Research and Practice for Information Systems - IFIP WG 8.4, 8.9\/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, 20\u201324 August 2012, Proceedings, pp. 547\u2013561 (2012). https:\/\/doi.org\/10.1007\/978-3-642-32498-7_42","DOI":"10.1007\/978-3-642-32498-7_42"},{"key":"29_CR23","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.entcs.2007.03.024","volume":"186","author":"F Martinelli","year":"2007","unstructured":"Martinelli, F., Petrocchi, M.: A uniform framework for security and trust modeling and analysis with crypto-CCS. Electr. Notes Theor. Comput. Sci. 186, 85\u201399 (2007). https:\/\/doi.org\/10.1016\/j.entcs.2007.03.024","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Matteucci, I., Mori, P., Petrocchi, M., Wiegand, L.: Controlled data sharing in E-health. In: Socio-Technical Aspects in Security and Trust (STAST), pp. 17\u201323. IEEE (2011)","DOI":"10.1109\/STAST.2011.6059251"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L.: CNL4DSA: a controlled natural language for data sharing agreements. In: Symposium on Applied Computing, pp. 616\u2013620. ACM (2010)","DOI":"10.1145\/1774088.1774218"},{"key":"29_CR26","unstructured":"OASIS XACML Technical Committee: eXtensible Access Control Markup Language (XACML) Version 3.0 (2013)"},{"key":"29_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-44760-5_1","volume-title":"Privacy Technologies and Policy","author":"JF Ruiz","year":"2016","unstructured":"Ruiz, J.F., et al.: A lifecycle for data sharing agreements: how it works out. In: Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K. (eds.) APF 2016. LNCS, vol. 9857, pp. 3\u201320. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44760-5_1"},{"key":"29_CR28","unstructured":"Schwitter, R.: Controlled natural languages for knowledge representation. In: Proceedings of the 23rd International Conference on Computational Linguistics: Posters, pp. 1113\u20131121. Association for Computational Linguistics (2010)"},{"key":"29_CR29","unstructured":"Schwitter, R., Kaljurand, K., Cregan, A., Dolbear, C., Hart, G., et al.: A comparison of three controlled natural languages for OWL 1.1. In: OWL: Experiences and directions (2008)"},{"key":"29_CR30","unstructured":"Stanford Encyclopedia of Philosophy: Quantifiers and quantification (2018). https:\/\/plato.stanford.edu\/entries\/quantification\/#SecOrdQua"},{"key":"29_CR31","doi-asserted-by":"publisher","unstructured":"Tanoli, I.K., Petrocchi, M., De Nicola, R.: Towards automatic translation of social network policies into controlled natural language. In: 12th International Conference on Research Challenges in Information Science, RCIS 2018, Nantes, France, 29\u201331 May 2018, pp. 1\u201312 (2018). https:\/\/doi.org\/10.1109\/RCIS.2018.8406683","DOI":"10.1109\/RCIS.2018.8406683"}],"container-title":["Lecture Notes in Computer Science","From Software Engineering to Formal Methods and Tools, and Back"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30985-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,8]],"date-time":"2019-12-08T19:26:49Z","timestamp":1575833209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30985-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030309848","9783030309855"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30985-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}