{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:34:24Z","timestamp":1761514464741},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030328719"},{"type":"electronic","value":"9783030328726"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32872-6_9","type":"book-chapter","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T23:04:24Z","timestamp":1570748664000},"page":"125-140","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Compositionality of Component Fault Trees"],"prefix":"10.1007","author":[{"given":"Simon","family":"Greiner","sequence":"first","affiliation":[]},{"given":"Peter","family":"Munk","sequence":"additional","affiliation":[]},{"given":"Arne","family":"Nordmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,11]]},"reference":[{"issue":"1 & 2","key":"9_CR1","first-page":"12","volume":"6","author":"JI Aizpurua","year":"2013","unstructured":"Aizpurua, J.I., Muxika, E.: Model-based design of dependable systems: limitations and evolution of analysis and verification approaches. Int. J. Adv. Secur. 6(1 & 2), 12\u201331 (2013)","journal-title":"Int. J. Adv. Secur."},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Amarnath, R., et al.: Dependability challenges in the model-driven engineering of automotive systems. In: Proceedings of ISSRE Workshops (2016). \n                      https:\/\/doi.org\/10.1109\/ISSREW.2016.15","DOI":"10.1109\/ISSREW.2016.15"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In: Proceedings of PLDI, pp. 259\u2013269 (2014). \n                      https:\/\/doi.org\/10.1145\/2594291.2594299","DOI":"10.1145\/2594291.2594299"},{"key":"9_CR4","doi-asserted-by":"publisher","unstructured":"Bauerei\u00df, T., et al.: CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees. In: Proceedings of Symposium on Security and Privacy, pp. 729\u2013748 (2017). \n                      https:\/\/doi.org\/10.1109\/SP.2017.24","DOI":"10.1109\/SP.2017.24"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-319-11936-6_7","volume-title":"Automated Technology for Verification and Analysis","author":"M Bozzano","year":"2014","unstructured":"Bozzano, M., Cimatti, A., Mattarei, C., Tonetta, S.: Formal safety assessment via contract-based design. In: Cassez, F., Raskin, J.-F. (eds.) ATVA 2014. LNCS, vol. 8837, pp. 81\u201397. Springer, Cham (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-319-11936-6_7"},{"issue":"9","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1016\/j.ress.2009.02.020","volume":"94","author":"IN Fovino","year":"2009","unstructured":"Fovino, I.N., Masera, M., Cian, A.D.: Integrating cyber attacks within fault trees. Reliab. Eng. Syst. Saf. 94(9), 1394\u20131402 (2009). \n                      https:\/\/doi.org\/10.1016\/j.ress.2009.02.020","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"9_CR7","unstructured":"Greiner, S., Birnstill, P., Krempel, E., Beckert, B., Beyerer, J.: Privacy preserving surveillance and the tracking-paradox. In: Proceedings of the Future Security - Security Research Conference, pp. 296\u2013302 (2013)"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Greiner, S., Grahl, D.: Non-interference with what-declassification in component-based systems. In: Proceedings of CSF, pp. 253\u2013267 (2016). \n                      https:\/\/doi.org\/10.1109\/CSF.2016.25","DOI":"10.1109\/CSF.2016.25"},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"Greiner, S.: A framework for non-interference in component-based systems. Ph.D. thesis. Karlsruher Institut f\u00fcr Technologie (KIT) (2018). \n                      https:\/\/doi.org\/10.5445\/IR\/1000082042","DOI":"10.5445\/IR\/1000082042"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-66197-1_19","volume-title":"Software Engineering and Formal Methods","author":"S Greiner","year":"2017","unstructured":"Greiner, S., Mohr, M., Beckert, B.: Modular verification of information flow security in component-based systems. In: Cimatti, A., Sirjani, M. (eds.) SEFM 2017. LNCS, vol. 10469, pp. 300\u2013315. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-66197-1_19"},{"issue":"6","key":"9_CR11","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10207-009-0086-1","volume":"8","author":"C Hammer","year":"2009","unstructured":"Hammer, C., Snelting, G.: Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs. Int. J. Inf. Secur. 8(6), 399\u2013422 (2009). \n                      https:\/\/doi.org\/10.1007\/s10207-009-0086-1","journal-title":"Int. J. Inf. Secur."},{"key":"9_CR12","first-page":"319","volume":"33","author":"D Hedin","year":"2012","unstructured":"Hedin, D., Sabelfeld, A.: A perspective on information-flow control. Softw. Saf. Secur. 33, 319\u2013347 (2012). NATO Science for Peace and Security Series - D: Information and Communication Security","journal-title":"Softw. Saf. Secur."},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"H\u00f6fig, K., et al.: Model-based reliability and safety: reducing the complexity of safety analyses using component fault trees. In: Proceedings of RAMS (2018). \n                      https:\/\/doi.org\/10.1109\/RAM.2018.8463058","DOI":"10.1109\/RAM.2018.8463058"},{"key":"9_CR14","unstructured":"International Electrotechnical Commission (IEC): IEC 61025: Fault tree analysis (FTA) (2006)"},{"key":"9_CR15","unstructured":"International Standard Organization (ISO): ISO 26262-4: Road vehicles - functional safety - Part 6: Product development at the system level (2018)"},{"key":"9_CR16","unstructured":"Society of Automotive Engineers (SAE): SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems (2016)"},{"key":"9_CR17","unstructured":"Kaiser, B., Liggesmeyer, P., M\u00e4ckel, O.: A new component concept for fault trees. In: Proceedings of SCS, pp. 37\u201346 (2003)"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1201\/9781351174664-103","volume-title":"Safety and Reliability \u2013 Safe Societies in a Changing World","author":"Bernhard Kaiser","year":"2018","unstructured":"Kaiser, B., et al.: Advances in component fault trees. In: Proceedings of ESREL (2018)"},{"key":"9_CR19","doi-asserted-by":"publisher","unstructured":"Lisagor, O., Kelly, T., Niu, R.: Model-based safety assessment: review of the discipline and its challenges. In: The Proceedings of ICRMS, pp. 625\u2013632 (2011). \n                      https:\/\/doi.org\/10.1109\/ICRMS.2011.5979344","DOI":"10.1109\/ICRMS.2011.5979344"},{"issue":"4","key":"9_CR20","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/2185395.2185444","volume":"39","author":"N Mahmud","year":"2012","unstructured":"Mahmud, N., Walker, M., Papadopoulos, Y.: Compositional synthesis of temporal fault trees from state machines. Perform. Eval. Rev. 39(4), 79\u201388 (2012). \n                      https:\/\/doi.org\/10.1145\/2185395.2185444","journal-title":"Perform. Eval. Rev."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"M\u00f6hrle, F., Zeller, M., H\u00f6fig, K., Rothfelder, M.: Automating compositional safety analysis using a failure type taxonomy for component fault trees. In: Risk, Reliability and Safety: Innovating Theory and Practice (2016)","DOI":"10.1201\/9781315210469-442"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Munk, P., et al.: INVITED: semi-automatic safety analysis and optimization. In: Proceedings of DAC (2018)","DOI":"10.1109\/DAC.2018.8465805"},{"key":"9_CR23","doi-asserted-by":"publisher","unstructured":"Nagaraju, V., Fiondella, L., Wandji, T.: A survey of fault and attack tree modeling and analysis for cyber risk management. In: Proceedings of THS (2017). \n                      https:\/\/doi.org\/10.1109\/THS.2017.7943455","DOI":"10.1109\/THS.2017.7943455"},{"key":"9_CR24","doi-asserted-by":"publisher","unstructured":"Nordmann, A., Munk, P.: Lessons learned from model-based safety assessment with SysML and component fault trees. In: Proceedings of MODELS (2018). \n                      https:\/\/doi.org\/10.1145\/3239372.3239373","DOI":"10.1145\/3239372.3239373"},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.ress.2012.09.011","volume":"110","author":"L Pi\u00e8tre-Cambac\u00e9d\u00e0s","year":"2013","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e0s, L., Bouissou, M.: Cross-fertilization between safety and security engineering. Reliab. Eng. Syst. Saf. 110, 110\u2013126 (2013). \n                      https:\/\/doi.org\/10.1016\/j.ress.2012.09.011","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Rafnsson, W., Hedin, D., Sabelfeld, A.: Securing interactive programs. In: Proceedings of CSF, pp. 293\u2013307 (2012)","DOI":"10.1109\/CSF.2012.15"},{"key":"9_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/978-3-319-49812-6_13","volume-title":"Deductive Software Verification \u2013 The KeY Book","author":"C Scheben","year":"2016","unstructured":"Scheben, C., Greiner, S.: Information flow analysis. In: Ahrendt, W., Beckert, B., Bubel, R., H\u00e4hnle, R., Schmitt, P., Ulbrich, M. (eds.) Deductive Software Verification \u2013 The KeY Book. LNCS, vol. 10001, pp. 453\u2013471. Springer, Cham (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-319-49812-6_13"},{"key":"9_CR28","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/B978-0-12-802301-3.00012-0","volume-title":"Software Quality Assurance","author":"Septavera Sharvia","year":"2016","unstructured":"Sharvia, S., Kabir, S., Walker, M., Papadopoulos, Y.: Model-based dependability analysis: state-of-the-art, challenges, and future outlook. In: Software Quality Assurance, pp. 251\u2013278 (2016). \n                      https:\/\/doi.org\/10.1016\/B978-0-12-802301-3.00012-0"},{"key":"9_CR29","unstructured":"Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: Proceedings of DECSSAFECOMP (2013)"},{"key":"9_CR30","unstructured":"Thums, A.: Formale Fehlerbaumanalyse. Ph.D. thesis. University of Augsburg, Germany (2004)"},{"key":"9_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/978-3-540-45236-2_40","volume-title":"FME 2003: Formal Methods","author":"A Thums","year":"2003","unstructured":"Thums, A., Schellhorn, G.: Model checking FTA. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805, pp. 739\u2013757. Springer, Heidelberg (2003). \n                      https:\/\/doi.org\/10.1007\/978-3-540-45236-2_40"},{"key":"9_CR32","doi-asserted-by":"publisher","unstructured":"Wittbold, J.T., Johnson, D.M.: Information flow in nondeterministic systems. In: Proceedings of RISP, pp. 144\u2013161 (1990). \n                      https:\/\/doi.org\/10.1109\/RISP.1990.63846","DOI":"10.1109\/RISP.1990.63846"}],"container-title":["Lecture Notes in Computer Science","Model-Based Safety and Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32872-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T23:08:11Z","timestamp":1570748891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32872-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030328719","9783030328726"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32872-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMBSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Model-Based Safety and Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thessaloniki","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imbsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/easyconferences.eu\/imbsa2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}