{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T21:38:21Z","timestamp":1770500301825,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031148613","type":"print"},{"value":"9783031148620","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-14862-0_11","type":"book-chapter","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T04:04:59Z","timestamp":1662437099000},"page":"145-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["DevOps and Safety? SafeOps! Towards Ensuring Safety in Feature-Driven Development with Frequent Releases"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6674-9434","authenticated-orcid":false,"given":"Peter","family":"Munk","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6881-8499","authenticated-orcid":false,"given":"Markus","family":"Schweizer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Beckers, K., Heisel, M., Frese, T., Hatebur, D.: A structured and model-based hazard analysis and risk assessment method for automotive systems\u2013a disruptive study. In: Reliability Engineering & System Safety, vol. 158, pp. 185\u2013195 (2017)","DOI":"10.1016\/j.ress.2016.09.004"},{"key":"11_CR2","unstructured":"Belagatti, P.: The scene of DevOps in the automotive industry (2020). https:\/\/dzone.com\/articles\/the-scene-of-devops-in-the-automotive-industry. Accessed 13 Apr 2022"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Cleland-Huang, J., Gotel, O.C., Huffman Hayes, J., M\u00e4der, P., Zisman, A.: Software traceability: trends and future directions. In: Proceedings of the Future of Software Engineering, pp. 55\u201369 (2014)","DOI":"10.1145\/2593882.2593891"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Fayollas, C., Bonnin, H., Flebus, O.: SafeOps: a concept of continuous safety. In: Proceedings of the EDCC (2020)","DOI":"10.1109\/EDCC51268.2020.00020"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Gautham, S., Jayakumar, A., Rajagopala, A., Elks, C.: Realization of a model-based DevOps process for industrial safety critical cyber physical systems. In: Proceedings of the ICPS (2021)","DOI":"10.1109\/ICPS49255.2021.9468213"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1049\/iet-sen.2013.0236","volume":"8","author":"D Heffernan","year":"2014","unstructured":"Heffernan, D., MacNamee, C., Fogarty, P.: Runtime verification monitoring for automotive embedded systems using the ISO 26262 Functional Safety Standard as a guide for the definition of the monitored properties. IET Softw. 8, 193\u2013203 (2014)","journal-title":"IET Softw."},{"key":"11_CR7","unstructured":"International Organization for Standardization (ISO). ISO 26262: Road vehicles\u2014functional safety (2018)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Jabbari, R., Ali, N., Petersen, K., Tanveer, B.: What is DevOps? A systematic mapping study on definitions and practices. In: Proceedings of the Workshop of XP (2016)","DOI":"10.1145\/2962695.2962707"},{"key":"11_CR9","unstructured":"Joshi, A., Miller, S., Whalen, M., Heimdahl, M.: A proposal for model-based safety analysis. In: Proceedings of the DASC (2005)"},{"key":"11_CR10","unstructured":"Kaiser, B., Liggesmeyer, P., M\u00e4ckel, O.: A new component concept for fault trees. In: Lindsay, P., Cant, T. (eds.) Proceedings of the Workshop on Safety Critical Systems and Software (2003)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Kaiser, B., et al.: Advances in component fault trees. In: Proceedings of the ESREL (2018)","DOI":"10.1201\/9781351174664-103"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Leveson, N.: Engineering a Safer World - Systems Thinking Applied to Safety. MIT Press (2012)","DOI":"10.7551\/mitpress\/8179.001.0001"},{"issue":"4","key":"11_CR13","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1007\/s10270-020-00782-w","volume":"19","author":"P Munk","year":"2020","unstructured":"Munk, P., Nordmann, A.: Model-based safety assessment with SysML and component fault trees: application and lessons learned. Softw. Syst. Model. 19(4), 889\u2013910 (2020). https:\/\/doi.org\/10.1007\/s10270-020-00782-w","journal-title":"Softw. Syst. Model."},{"key":"11_CR14","unstructured":"Munk, P., Schweizer, M., Schneider, D., Adler, R., Velasco, S.: Model-based dependent failure analysis (2021). https:\/\/safetronic.fraunhofer.de\/wp-content\/uploads\/2021\/11\/Safetronic21-ModelBased-DFA-Munk.pdf. Accessed 29 Apr 2022"},{"key":"11_CR15","unstructured":"Palmer, S., Felsing, J.: A Practical Guide to Feature-Driven Development. Prentice Hall (2002)"},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0951-8320(00)00076-4","volume":"71","author":"Y Papadopoulos","year":"2001","unstructured":"Papadopoulos, Y., McDermid, J., Sasse, R., Heiner, G.: Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure. Reliab. Eng. Syst. Saf. 71, 229\u2013247 (2001)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"Pohl, K., H\u00f6nninger, H., Achatz, R., Broy, M.: Model-Based Engineering of Embedded Systems: The SPES 2020 Methodology. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34614-9","DOI":"10.1007\/978-3-642-34614-9"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Sari, B., Reuss, H.: A model-driven approach for dependent failure analysis in consideration of multicore processors using modified EAST-ADL. SAE Technical Paper (2017)","DOI":"10.4271\/2017-01-0065"},{"key":"11_CR19","doi-asserted-by":"publisher","unstructured":"Ratiu, D., Nordmann, A., Munk, P., Carlan, C., Voelter, M.: FASTEN: an extensible platform to experiment with rigorous modeling of safety-critical systems. In: Bucchiarone, A., Cicchetti, A., Ciccozzi, F., Pierantonio, A. (eds) Domain-Specific Languages in Practice. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-73758-0_5","DOI":"10.1007\/978-3-030-73758-0_5"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Sharvia, S., Kabir, S., Walker, M., Papadopoulos, Y: Model-based dependability analysis: state-of-the-art, challenges, and future outlook. In: Mistrik, I., Soley, R., Ali, N., Grundy, J., Tekinerdogan, B. (eds.) Software Quality Assurance, Morgan Kaufmann (2016)","DOI":"10.1016\/B978-0-12-802301-3.00012-0"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Siddique, U.: SafetyOps (2020). https:\/\/doi.org\/10.48550\/arXiv.2008.04461. Accessed 5 Feb 2022","DOI":"10.48550\/arXiv.2008.04461"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"V\u00f6st, S., Wagner, S.: Keeping continuous deliveries safe. In: Proceedings of the ICSE-C (2017)","DOI":"10.1109\/ICSE-C.2017.135"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-83906-2_11","volume-title":"Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops","author":"M Zeller","year":"2021","unstructured":"Zeller, M.: Towards continuous safety assessment in context of DevOps. In: Habli, I., Sujan, M., Gerasimou, S., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2021. LNCS, vol. 12853, pp. 145\u2013157. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-83906-2_11"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-14862-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T04:07:08Z","timestamp":1662437228000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-14862-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031148613","9783031148620"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-14862-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp22.iks.fraunhofer.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3, 2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5, 5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The review process was thorough with at least 3 reviewers with ensured independency (single blind). In April 2022 an on-line meeting took place for the final discussion and selection.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}