{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:10:58Z","timestamp":1750137058339,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031148347"},{"type":"electronic","value":"9783031148354"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14835-4_6","type":"book-chapter","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T12:05:36Z","timestamp":1661342736000},"page":"82-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Automating Pattern Selection for\u00a0Assurance Case Development for\u00a0Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Shreyas","family":"Ramakrishna","sequence":"first","affiliation":[]},{"given":"Hyunjee","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Dubey","sequence":"additional","affiliation":[]},{"given":"Arun","family":"Ramamurthy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,25]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Bishop, P., Bloomfield, R.: A methodology for safety case development. In: Safety and Reliability, vol. 20, pp. 34\u201342. Taylor & Francis (2000)","DOI":"10.1080\/09617353.2000.11690698"},{"key":"6_CR2","unstructured":"Chindamaikul, K., Toshinori, T., Port, D., Hajimu, I.: Automatic approach to prepare information for constructing an assurance case. In: International Conference of Product Focused Software Development and Process Improvement (2014)"},{"key":"6_CR3","unstructured":"Del Fabro, M.D., et al.: Applying generic model management to data mapping. In: BDA (2005)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-40793-2_3","volume-title":"Computer Safety, Reliability, and Security","author":"E Denney","year":"2013","unstructured":"Denney, E., Pai, G.: A formal basis for safety case patterns. In: Bitsch, F., Guiochet, J., Ka\u00e2niche, M. (eds.) SAFECOMP 2013. LNCS, vol. 8153, pp. 21\u201332. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40793-2_3"},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1109\/TR.2014.2335995","volume":"63","author":"E Denney","year":"2014","unstructured":"Denney, E., Pai, G.: Automating the assembly of aviation safety cases. IEEE Trans. Reliab. 63(4), 830\u2013849 (2014)","journal-title":"IEEE Trans. Reliab."},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-642-33675-1_2","volume-title":"Computer Safety, Reliability, and Security","author":"E Denney","year":"2012","unstructured":"Denney, E., Pai, G., Pohl, J.: AdvoCATE: an assurance case automation toolset. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol. 7613, pp. 8\u201321. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33675-1_2"},{"key":"6_CR7","unstructured":"Dosovitskiy, A., Ros, G., Codevilla, F., Lopez, A., Koltun, V.: Carla: an open urban driving simulator. arXiv:1711.03938 (2017)"},{"key":"6_CR8","unstructured":"European Organisation for the Safety of Air Navigation: Safety case development manual, version 2.2 (2006)"},{"key":"6_CR9","unstructured":"FDA: Introduction of assurance case method and its application in regulatory science (2019). https:\/\/www.fda.gov\/media\/125182\/download"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Foster, S., Nemouchi, Y., O\u2019Halloran, C., Stephenson, K., Tudor, N.: Formal model-based assurance cases in Isabelle\/SACM (2020)","DOI":"10.1145\/3372020.3391559"},{"issue":"3","key":"6_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2692956.2663177","volume":"34","author":"A Gacek","year":"2014","unstructured":"Gacek, A., Backes, J., Cofer, D., Slind, K., Whalen, M.: Resolute: an assurance case language for architecture models. ACM SIGAda Ada Lett. 34(3), 19\u201328 (2014)","journal-title":"ACM SIGAda Ada Lett."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Hartsell, C., Mahadevan, N., Dubey, A., Karsai, G.: Automated method for assurance case construction from system design models. In: 2021 5th International Conference on System Reliability and Safety (ICSRS), pp. 230\u2013239 (2021)","DOI":"10.1109\/ICSRS53853.2021.9660735"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Hawkins, R., Habli, I., Kolovos, D., Paige, R., Kelly, T.: Weaving an assurance case from design: a model-based approach. In: 2015 IEEE 16th International Symposium on High Assurance Systems Engineering, pp. 110\u2013117. IEEE (2015)","DOI":"10.1109\/HASE.2015.25"},{"key":"6_CR14","doi-asserted-by":"publisher","unstructured":"Hawkins, R., Kelly, T., Knight, J., Graydon, P.: A new approach to creating clear safety arguments. In: Dale, C., Anderson, T. (eds) Advances in Systems Safety, pp. 3\u201323. Springer, London (2011). https:\/\/doi.org\/10.1007\/978-0-85729-133-2_1","DOI":"10.1007\/978-0-85729-133-2_1"},{"key":"6_CR15","unstructured":"Kelly, T., Weaver, R.: The goal structuring notation-a safety argument notation. In: Proceedings of the Dependable Systems and Networks Workshop on Assurance Cases, p. 6. Citeseer (2004)"},{"key":"6_CR16","unstructured":"Kelly, T.P.: Arguing safety: a systematic approach to managing safety cases. Ph.D. thesis, University of York, York (1999)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-99229-7_6","volume-title":"Computer Safety, Reliability, and Security","author":"M Maksimov","year":"2018","unstructured":"Maksimov, M., Fung, N.L.S., Kokaly, S., Chechik, M.: Two decades of assurance case tools: a survey. In: Gallina, B., Skavhaug, A., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2018. LNCS, vol. 11094, pp. 49\u201359. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99229-7_6"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2014.12.002","volume":"60","author":"S Nair","year":"2015","unstructured":"Nair, S., de la Vara, J.L., Sabetzadeh, M., Falessi, D.: Evidence management for compliance of critical systems with safety standards: a survey on the state of practice. Inf. Softw. Technol. 60, 1\u201315 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Palin, R., Ward, D., Habli, I., Rivett, R.: Iso 26262 safety cases: compliance and assurance (2011)","DOI":"10.1049\/cp.2011.0251"},{"key":"6_CR20","unstructured":"Ramakrishna, S., Hartsell, C., Dubey, A., Pal, P., Karsai, G.: A methodology for automating assurance case generation. arXiv preprint arXiv:2003.05388 (2020)"},{"key":"6_CR21","unstructured":"Safety-Critical Systems Club: Tiered pattern catalogue (2022). https:\/\/scsc.uk\/gsn?page=gsn%205Library%20Patterns"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Szczygielska, M., Jarzkebowicz, A.: Assurance case patterns on-line catalogue. In: Advances in Dependability Engineering of Complex Systems, pp. 407\u2013417 (2017)","DOI":"10.1007\/978-3-319-59415-6_39"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"de la Vara, J.L., Parra, E., Ruiz, A., Gallina, B.: The amass tool platform: an innovative solution for assurance and certification of cyber-physical systems. In: REFSQ Workshops (2020)","DOI":"10.1016\/j.jss.2020.110812"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Yamamoto, S., Matsuno, Y.: An evaluation of argument patterns to reduce pitfalls of applying assurance case. In: 2013 1st International Workshop on Assurance Cases for Software-Intensive Systems (ASSURE), pp. 12\u201317. IEEE (2013)","DOI":"10.1109\/ASSURE.2013.6614265"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14835-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T23:03:18Z","timestamp":1661814198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14835-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031148347","9783031148354"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14835-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp22.iks.fraunhofer.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3, 2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5, 5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The review process was thorough with at least 3 reviewers with ensured independency (single blind). In April 2022 an on-line meeting took place for the final discussion and selection.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}