{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T21:57:54Z","timestamp":1770501474011,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030839055","type":"print"},{"value":"9783030839062","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83906-2_11","type":"book-chapter","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T23:05:04Z","timestamp":1629846304000},"page":"145-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Towards Continuous Safety Assessment in\u00a0Context of DevOps"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6738-7903","authenticated-orcid":false,"given":"Marc","family":"Zeller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,25]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","unstructured":"C\u00e2rlan, C., Petri\u015eor, D., Gallina, B., Schoenhaar, H.: Checkable safety cases: enabling automated consistency checks between safety work products. In: 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 295\u2013302 (2020). https:\/\/doi.org\/10.1109\/ISSREW51248.2020.00088","DOI":"10.1109\/ISSREW51248.2020.00088"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Fitzgerald, B., Stol, K., O\u2019Sullivan, R., O\u2019Brien, D.: Scaling agile methods to regulated environments: an industry case study. In: 35th International Conference on Software Engineering (2013)","DOI":"10.1109\/ICSE.2013.6606635"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Foster, S., Nemouchi, Y., Gleirscher, M., Wei, R., Kelly, T.: Integration of formal proof into unified assurance cases with Isabelle\/SACM (2020)","DOI":"10.1145\/3372020.3391559"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-45480-1_9","volume-title":"Computer Safety, Reliability, and Security","author":"J Fr\u00f6hlich","year":"2016","unstructured":"Fr\u00f6hlich, J., Frtunikj, J., Rothbauer, S., St\u00fcckj\u00fcrgen, C.: Testing safety properties of cyber-physical systems with non-intrusive fault injection \u2013 an\u00a0industrial case study. In: Skavhaug, A., Guiochet, J., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9923, pp. 105\u2013117. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45480-1_9"},{"key":"11_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99334-8","volume-title":"SafeScrum\u00ae-Agile Development of Safety-Critical Software","author":"GK Hanssen","year":"2018","unstructured":"Hanssen, G.K., St\u00e5lhane, T., Myklebust, T.: SafeScrum\u00ae-Agile Development of Safety-Critical Software. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-319-99334-8"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"H\u00f6fig, K., et al.: Model-based reliability and safety: reducing the complexity of safety analyses using component fault trees. In: 2018 Annual Reliability and Maintainability Symposium (RAMS) (2018)","DOI":"10.1109\/RAM.2018.8463058"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"H\u00f6fig, K., Zeller, M., Heilmann, R.: Alfred: a methodology to enable component fault trees for layered architectures. In: 41st Euromicro Conference on Software Engineering and Advanced Applications (SEAA), pp. 167\u2013176 (2015)","DOI":"10.1109\/SEAA.2015.26"},{"key":"11_CR8","unstructured":"Joshi, A., Miller, S.P., Whalen, M., Heimdahl, M.P.E.: A proposal for model-based safety analysis. In: 24th AIAA\/IEEE Digital Avionics Systems Conference (2005)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Kaiser, B., et al.: Advances in component fault trees. In: Proceedings of 28th European Safety and Reliability Conference (ESREL), pp. 815\u2013823 (2018)","DOI":"10.1201\/9781351174664-103"},{"key":"11_CR10","unstructured":"Kaiser, B., Liggesmeyer, P., M\u00e4ckel, O.: A new component concept for fault trees. In: Proceedings of the 8th Australian Workshop on Safety Critical Systems and Software, pp. 37\u201346 (2003)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Kaukewitsch, C., Papist, H., Zeller, M., Rothfelder, M.: Automatic generation of RAMS analyses from model-based functional descriptions using UML state machines. In: 2020 Annual Reliability and Maintainability Symposium (RAMS) (2020)","DOI":"10.1109\/RAMS48030.2020.9153667"},{"key":"11_CR12","volume-title":"What is DevOps?","author":"M Loukides","year":"2012","unstructured":"Loukides, M.: What is DevOps? O\u2019Reilly Media Inc., Sebastopol (2012)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"M\u00f6hrle, F., Bizik, K., Zeller, M., H\u00f6fig, K., Rothfelder, M., Liggesmeyer, P.: A formal approach for automating compositional safety analysis using flow type annotations in component fault trees. In: Proceedings of the 27th European Safety and Reliability Conference (ESREL) (2017)","DOI":"10.1201\/9781315210469-442"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"M\u00f6hrle, F., Zeller, M., H\u00f6fig, K., Rothfelder, M., Liggesmeyer, P.: Automating compositional safety analysis using a failure type taxonomy for component fault trees. In: Proceedings of ESREL 2016, pp. 1380\u20131387 (2016)","DOI":"10.1201\/9781315374987-207"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-030-62136-0_8","volume-title":"Model-Based Engineering of Collaborative Embedded Systems","author":"DSV Moncada","year":"2021","unstructured":"Moncada, D.S.V.: Dynamic safety certification for collaborative embedded systems at runtime. In: Model-Based Engineering of Collaborative Embedded Systems, pp. 171\u2013196. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-62136-0_8"},{"key":"11_CR16","unstructured":"Object Managemnet Group (OMG): Structured Assurance Case Metamodel 2.0 (SACM) (2018)"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-319-24249-1_7","volume-title":"Computer Safety, Reliability, and Security","author":"D Ratiu","year":"2015","unstructured":"Ratiu, D., Zeller, M., Killian, L.: Safety.Lab: model-based domain specific tooling for safety argumentation. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 72\u201382. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24249-1_7"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-030-26601-1_18","volume-title":"Computer Safety, Reliability, and Security","author":"J Reich","year":"2019","unstructured":"Reich, J., Zeller, M., Schneider, D.: Automated evidence analysis of safety arguments using digital dependability identities. In: Romanovsky, A., Troubitsyna, E., Bitsch, F. (eds.) SAFECOMP 2019. LNCS, vol. 11698, pp. 254\u2013268. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26601-1_18"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-030-58920-2_2","volume-title":"Model-Based Safety and Assessment","author":"J Reich","year":"2020","unstructured":"Reich, J., Frey, J., Cioroaica, E., Zeller, M., Rothfelder, M.: Argument-driven safety engineering of a generic infusion pump with digital dependability identities. In: Zeller, M., H\u00f6fig, K. (eds.) IMBSA 2020. LNCS, vol. 12297, pp. 19\u201333. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58920-2_2"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-319-64119-5_14","volume-title":"Model-Based Safety and Assessment","author":"S Reiter","year":"2017","unstructured":"Reiter, S., Zeller, M., H\u00f6fig, K., Viehl, A., Bringmann, O., Rosenstiel, W.: Verification of component fault trees using error effect simulations. In: Bozzano, M., Papadopoulos, Y. (eds.) IMBSA 2017. LNCS, vol. 10437, pp. 212\u2013226. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64119-5_14"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Schneider, D., Trapp, M., Papadopoulos, Y., Armengaud, E., Zeller, M., H\u00f6fig, K.: Wap: digital dependability identities. In: IEEE International Symposium on Software Reliability Engineering (ISSRE), pp. 324\u2013329 (2015)","DOI":"10.1109\/ISSRE.2015.7381825"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-030-35333-9_26","volume-title":"Product-Focused Software Process Improvement","author":"J-P Stegh\u00f6fer","year":"2019","unstructured":"Stegh\u00f6fer, J.-P., Knauss, E., Horkoff, J., Wohlrab, R.: Challenges of scaled agile for safety-critical systems. In: Franch, X., M\u00e4nnist\u00f6, T., Mart\u00ednez-Fern\u00e1ndez, S. (eds.) PROFES 2019. LNCS, vol. 11915, pp. 350\u2013366. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35333-9_26"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Vost, S., Wagner, S.: Keeping continuous deliveries safe. In: IEEE\/ACM 39th International Conference on Software Engineering Companion (2017)","DOI":"10.1109\/ICSE-C.2017.135"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Warg, F., Blom, H., Borg, J., Johansson, R.: Continuous deployment for dependable systems with continuous assurance cases. In: IEEE International Symposium on Software Reliability Engineering Workshops (2019)","DOI":"10.1109\/ISSREW.2019.00091"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Zeller, M., H\u00f6fig, K.: Confetti - component fault tree-based testing. In: Proceedings of the 25th European Safety and Reliability Conference (ESREL), pp. 4011\u20134017 (2015)","DOI":"10.1201\/b19094-526"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Zeller, M., H\u00f6fig, K., Schwinn, J.P.: Arches - automatic generation of component fault trees from continuous function charts. In: Proceedings of the 2017 IEEE 15th International Conference on Industrial Informatics (INDIN), pp. 577\u2013582 (2017)","DOI":"10.1109\/INDIN.2017.8104836"},{"key":"11_CR27","unstructured":"Zeller, M., Ratiu, D., Rothfelder, M., Buschmann, F.: An Industrial Roadmap for Continuous Delivery of Software for Safety-critical Systems. In: 39th International Conference on Computer Safety, Reliability and Security, Position Paper (2020)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83906-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:41:14Z","timestamp":1710265274000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83906-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030839055","9783030839062"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83906-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"York","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2021.hosted.york.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the workshops 26 full and 4 short papers were accepted for publication.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}