{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:59:54Z","timestamp":1759939194254,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031148347"},{"type":"electronic","value":"9783031148354"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14835-4_5","type":"book-chapter","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T12:05:36Z","timestamp":1661342736000},"page":"65-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["ARACHNE: Automated Validation of\u00a0Assurance Cases with\u00a0Stochastic Contract Networks"],"prefix":"10.1007","author":[{"given":"Chanwook","family":"Oh","sequence":"first","affiliation":[]},{"given":"Nikhil","family":"Naik","sequence":"additional","affiliation":[]},{"given":"Zamira","family":"Daw","sequence":"additional","affiliation":[]},{"given":"Timothy E.","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Pierluigi","family":"Nuzzo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,25]]},"reference":[{"key":"5_CR1","unstructured":"ISO 26262:2018: Road vehicles - Functional safety. International Organization for Standardization, Standard (2018)"},{"key":"5_CR2","unstructured":"DO-178C: Software considerations in airborne systems and equipment certification. RTCA Inc., Standard (2011)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Brunner, M., Huber, M., et al.: Towards an integrated model for safety and security requirements of cyber-physical systems. In: International Conference on Software Quality, Reliability and Security Companion (QRS-C) (2017)","DOI":"10.1109\/QRS-C.2017.63"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.mfglet.2018.09.002","volume":"18","author":"J Lee","year":"2018","unstructured":"Lee, J., Davari, H., et al.: Industrial artificial intelligence for industry 4.0-based manufacturing systems. Manuf. Lett. 18, 20\u201323 (2018)","journal-title":"Manuf. Lett."},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-84996-086-1_4","volume-title":"Making Systems Safer","author":"R Bloomfield","year":"2010","unstructured":"Bloomfield, R., Bishop, P.: Safety and assurance cases: past, present and possible future-an Adelard perspective. In: Dale, C., Anderson, T. (eds.) Making Systems Safer, pp. 51\u201367. Springer, London (2010). https:\/\/doi.org\/10.1007\/978-1-84996-086-1_4"},{"key":"5_CR6","unstructured":"Rushby, J.: The interpretation and evaluation of assurance cases. Technical report, Computer Science Laboratory, SRI International (2015)"},{"key":"5_CR7","unstructured":"Adelard LLP: Claims, Arguments and Evidence (CAE) (2019). https:\/\/www.adelard.com\/asce\/choosing-asce\/cae.html"},{"key":"5_CR8","unstructured":"The Assurance Case Working Group: Goal Structuring Notation Community Standard (Version 3) (2021). https:\/\/scsc.uk\/r141C"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.ssci.2013.04.007","volume":"59","author":"R Hawkins","year":"2013","unstructured":"Hawkins, R., Habli, I., et al.: Assurance cases and prescriptive software safety certification: a comparative study. Saf. Sci. 59, 55\u201371 (2013)","journal-title":"Saf. Sci."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Hawkins, R., Habli, I., et al.: Weaving an assurance case from design: a model-based approach. In: International Symposium on High Assurance Systems Engineering (2015)","DOI":"10.1109\/HASE.2015.25"},{"key":"5_CR11","unstructured":"Bloomfield, R., Rushby, J.: Assurance 2.0, arXiv preprint arXiv:2004.10474 (2020)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Denney, E., Pai, G., Pohl, J.: Heterogeneous aviation safety cases: integrating the formal and the non-formal. In: International Conference on Engineering of Complex Computer Systems (2012)","DOI":"10.1109\/ICECCS20050.2012.6299215"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.ssci.2016.09.014","volume":"92","author":"PJ Graydon","year":"2017","unstructured":"Graydon, P.J., Holloway, C.M.: An investigation of proposed techniques for quantifying confidence in assurance arguments. Saf. Sci. 92, 53\u201365 (2017)","journal-title":"Saf. Sci."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Denney, E., Pai, G., Habli, I.: Towards measurement of confidence in safety cases. In: 2011 International Symposium on Empirical Software Engineering and Measurement (2011)","DOI":"10.1109\/ESEM.2011.53"},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"38","author":"AP Dempster","year":"1967","unstructured":"Dempster, A.P.: Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 38(2), 325\u2013339 (1967)","journal-title":"Ann. Math. Stat."},{"issue":"03","key":"5_CR16","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 9(03), 279\u2013311 (2001)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Yamamoto, S.: Assuring security through attribute GSN. In: International Conference on IT Convergence and Security (ICITCS) (2015)","DOI":"10.1109\/ICITCS.2015.7292954"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-319-10557-4_45","volume-title":"Computer Safety, Reliability, and Security","author":"S Nair","year":"2014","unstructured":"Nair, S., Walkinshaw, N., Kelly, T.: Quantifying uncertainty in safety cases using evidential reasoning. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds.) SAFECOMP 2014. LNCS, vol. 8696, pp. 413\u2013418. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10557-4_45"},{"key":"5_CR19","volume-title":"Learning Bayesian Networks","author":"R Neapolitan","year":"2004","unstructured":"Neapolitan, R., Neapolitan, R.: Learning Bayesian Networks. Pearson Prentice Hall, Hoboken (2004)"},{"key":"5_CR20","unstructured":"Adams, E.W.: A Primer of Probability Logic. Center for the Study of Language and Information (1996)"},{"key":"5_CR21","unstructured":"Holloway, C.M.: Explicate\u201978: uncovering the implicit assurance case in DO-178C. In: Safety-Critical Systems Symposium 2015 (SSS 2015) (2015)"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-642-33675-1_2","volume-title":"Computer Safety, Reliability, and Security","author":"E Denney","year":"2012","unstructured":"Denney, E., Pai, G., Pohl, J.: AdvoCATE: an assurance case automation toolset. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol. 7613, pp. 8\u201321. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33675-1_2"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Fujita, H., Matsuno, Y., et al.: DS-bench toolset: tools for dependability benchmarking with simulation and assurance. In: IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) (2012)","DOI":"10.1109\/DSN.2012.6263915"},{"issue":"2\u20133","key":"5_CR24","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1561\/1000000053","volume":"12","author":"A Benveniste","year":"2018","unstructured":"Benveniste, A., Caillaud, B., et al.: Contracts for system design. Found. Trends Electron. Des. Autom. 12(2\u20133), 124\u2013400 (2018)","journal-title":"Found. Trends Electron. Des. Autom."},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-642-28872-2_3","volume-title":"Fundamental Approaches to Software Engineering","author":"SS Bauer","year":"2012","unstructured":"Bauer, S.S., et al.: Moving from specifications to contracts in component-based design. In: de Lara, J., Zisman, A. (eds.) FASE 2012. LNCS, vol. 7212, pp. 43\u201358. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28872-2_3"},{"issue":"3","key":"5_CR26","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3166\/ejc.18.217-238","volume":"18","author":"A Sangiovanni-Vincentelli","year":"2012","unstructured":"Sangiovanni-Vincentelli, A., Damm, W., Passerone, R.: Taming Dr. Frankenstein: contract-based design for cyber-physical systems. Eur. J. Control. 18(3), 217\u2013238 (2012)","journal-title":"Eur. J. Control."},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Nuzzo, P., Sangiovanni-Vincentelli, A.L., et al.: A platform-based design methodology with contracts and related tools for the design of cyber-physical systems. In: Proceedings of the IEEE (2015)","DOI":"10.1109\/JPROC.2015.2453253"},{"issue":"1","key":"5_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02759729","volume":"2","author":"H Gaifman","year":"1964","unstructured":"Gaifman, H.: Concerning measures in first order calculi. Israel J. Math. 2(1), 1\u201318 (1964)","journal-title":"Israel J. Math."},{"issue":"3","key":"5_CR29","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1305\/ndjfl\/1093870625","volume":"25","author":"T Hailperin","year":"1984","unstructured":"Hailperin, T.: Probability logic. Notre Dame J. Formal Logic 25(3), 198\u2013212 (1984)","journal-title":"Notre Dame J. Formal Logic"},{"issue":"1","key":"5_CR30","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/0004-3702(86)90031-7","volume":"28","author":"NJ Nilsson","year":"1986","unstructured":"Nilsson, N.J.: Probabilistic logic. Artif. Intell. 28(1), 71\u201387 (1986)","journal-title":"Artif. Intell."},{"issue":"1","key":"5_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3243216","volume":"18","author":"P Nuzzo","year":"2019","unstructured":"Nuzzo, P., Li, J., et al.: Stochastic assume-guarantee contracts for cyber-physical system design. ACM Trans. Embed. Comput. Syst. 18(1), 1\u201326 (2019)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"5_CR32","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-031-06773-0_9","volume-title":"NASA Formal Methods","author":"TE Wang","year":"2022","unstructured":"Wang, T.E., Daw, Z., Nuzzo, P., Pinto, A.: Hierarchical contract-based synthesis for assurance cases. In: Deshmukh, J.V., Havelund, K., Perez, I. (eds.) NASA Formal Methods, pp. 175\u2013192. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06773-0_9"},{"key":"5_CR33","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-1-4471-2494-8_12","volume-title":"Achieving Systems Safety","author":"C Hobbs","year":"2012","unstructured":"Hobbs, C., Lloyd, M.: The application of Bayesian belief networks to assurance case preparation. In: Dale, C., Anderson, T. (eds.) Achieving Systems Safety, pp. 159\u2013176. Springer, London (2012). https:\/\/doi.org\/10.1007\/978-1-4471-2494-8_12"},{"key":"5_CR34","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.engappai.2017.01.011","volume":"60","author":"K Verbert","year":"2017","unstructured":"Verbert, K., Babu\u0161ka, R., De Schutter, B.: Bayesian and Dempster-Shafer reasoning for knowledge-based fault diagnosis-a comparative study. Eng. Appl. Artif. Intell. 60, 136\u2013150 (2017)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"5_CR35","volume-title":"Bayesian Epistemology","author":"L Bovens","year":"2003","unstructured":"Bovens, L., Hartmann, S.: Bayesian Epistemology. Oxford University Press, Oxford (2003)"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"De Moura, L., Bj\u00f8rner, N.: Z3: An efficient SMT solver (2008)","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Ankan, A., Panda, A.: pgmpy: probabilistic graphical models using python. In: Proceedings of the 14th Python in Science Conference (SCIPY 2015). Citeseer (2015)","DOI":"10.25080\/Majora-7b98e3ed-001"},{"key":"5_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-33675-1_7","volume-title":"Computer Safety, Reliability, and Security","author":"X Zhao","year":"2012","unstructured":"Zhao, X., Zhang, D., Lu, M., Zeng, F.: A new approach to assessment of confidence in assurance cases. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol. 7613, pp. 79\u201391. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33675-1_7"},{"key":"5_CR39","unstructured":"Shalev-Shwartz, S., Shammah, S., Shashua, A.: On a formal model of safe and scalable self-driving cars, arXiv preprint arXiv:1708.06374 (2017)"},{"key":"5_CR40","unstructured":"Mobileye: The Mobileye safety methodology (2021). https:\/\/www.mobileye.com\/safety-methodology\/"},{"key":"5_CR41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811357","volume-title":"Modeling and Reasoning with Bayesian Networks","author":"A Darwiche","year":"2009","unstructured":"Darwiche, A.: Modeling and Reasoning with Bayesian Networks. Cambridge University Press, Cambridge (2009)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14835-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T23:03:29Z","timestamp":1661814209000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14835-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031148347","9783031148354"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14835-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp22.iks.fraunhofer.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3, 2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5, 5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The review process was thorough with at least 3 reviewers with ensured independency (single blind). In April 2022 an on-line meeting took place for the final discussion and selection.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}