{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:53:25Z","timestamp":1757588005387,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031409523"},{"type":"electronic","value":"9783031409530"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40953-0_12","type":"book-chapter","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T17:02:08Z","timestamp":1694624528000},"page":"135-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Computer-Aided Generation of\u00a0Assurance Cases"],"prefix":"10.1007","author":[{"given":"Timothy E.","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chanwook","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Low","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Amundson","sequence":"additional","affiliation":[]},{"given":"Zamira","family":"Daw","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Massimiliano L.","family":"Chiodo","sequence":"additional","affiliation":[]},{"given":"Guoqiang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Saqib","family":"Hasan","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Melville","sequence":"additional","affiliation":[]},{"given":"Pierluigi","family":"Nuzzo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,14]]},"reference":[{"key":"12_CR1","unstructured":"Holloway, C.: Understanding the overarching properties, ser. NASA technical memorandum (2019)"},{"key":"12_CR2","unstructured":"Rushby, J.: The interpretation and evaluation of assurance cases. Computer Science Laboratory, SRI International, Menlo Park, CA, Technical report. SRI-CSL-15-01 (2015)"},{"key":"12_CR3","unstructured":"TACW Group: Goal structuring notation community standard (version 3) (2021)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Hawkins, R., Habli, I., et al.: Weaving an assurance case from design: a model-based approach. In: International Symposium High Assurance Systems Engineering, pp. 110\u2013117 (2015)","DOI":"10.1109\/HASE.2015.25"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-1-84996-086-1_1","volume-title":"Making Systems Safer","author":"J Rushby","year":"2010","unstructured":"Rushby, J.: Formalism in safety cases. In: Dale, C., Anderson, T. (eds.) Making Systems Safer, pp. 3\u201317. Springer, London (2010). https:\/\/doi.org\/10.1007\/978-1-84996-086-1_1"},{"key":"12_CR6","unstructured":"Bloomfield, R., Rushby, J.: Assurance 2.0. arXiv preprint arXiv:2004.10474 (2020)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-642-33675-1_2","volume-title":"Computer Safety, Reliability, and Security","author":"E Denney","year":"2012","unstructured":"Denney, E., Pai, G., Pohl, J.: AdvoCATE: an assurance case automation toolset. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol. 7613, pp. 8\u201321. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33675-1_2"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Barry, M.R.: CertWare: a workbench for safety case production and analysis. In: Aerospace conference, pp. 1\u201310 (2011)","DOI":"10.1109\/AERO.2011.5747648"},{"key":"12_CR9","unstructured":"Matsuno, Y.: D-case editor: a typed assurance case editor. University of Tokyo (2011)"},{"key":"12_CR10","unstructured":"Adelard LLP. Assurance and safety case environment (ASCE) (2011). https:\/\/www.adelard.com\/asce\/"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-92432-8_2","volume-title":"Reliable Software Technologies \u2013 Ada-Europe 2018","author":"I Sljivo","year":"2018","unstructured":"Sljivo, I., Gallina, B., Carlson, J., Hansson, H., Puri, S.: Tool-supported safety-relevant component reuse: from specification to argumentation. In: Casimiro, A., Ferreira, P.M. (eds.) Ada-Europe 2018. LNCS, vol. 10873, pp. 19\u201333. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92432-8_2"},{"key":"12_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101765","volume":"110","author":"I \u0160ljivo","year":"2020","unstructured":"\u0160ljivo, I., Uriagereka, G.J., et al.: Guiding assurance of architectural design patterns for critical applications. J. Syst. Architect. 110, 101765 (2020)","journal-title":"J. Syst. Architect."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"de la Vara, J.L., Ruiz, A., Blondelle, G.: Assurance and certification of cyber-physical systems: the AMASS open source ecosystem. J. Syst. Softw. 171, 110812 (2021). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121220302120","DOI":"10.1016\/j.jss.2020.110812"},{"key":"12_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110922","volume":"176","author":"D Ne\u0161i\u0107","year":"2021","unstructured":"Ne\u0161i\u0107, D., Nyberg, M., Gallina, B.: Product-line assurance cases from contract-based design. J. Syst. Softw. 176, 110922 (2021)","journal-title":"J. Syst. Softw."},{"key":"12_CR15","unstructured":"Neapolitan, R.: Learning Bayesian Networks, ser. Artificial Intelligence. Pearson Prentice Hall (2004)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"C\u00e2rlan, C., Nigam, V., et al.: ExplicitCase: tool-support for creating and maintaining assurance arguments integrated with system models. In: International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 330\u2013337 (2019)","DOI":"10.1109\/ISSREW.2019.00093"},{"key":"12_CR17","unstructured":"Ramakrishna, S., Hartsell, C., et al.: A methodology for automating assurance case generation. arXiv preprint arXiv:2003.05388 (2020)"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.ssci.2016.09.014","volume":"92","author":"PJ Graydon","year":"2017","unstructured":"Graydon, P.J., Holloway, C.M.: An investigation of proposed techniques for quantifying confidence in assurance arguments. Saf. Sci. 92, 53\u201365 (2017)","journal-title":"Saf. Sci."},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-031-14835-4_5","volume-title":"Computer Safety, Reliability, and Security","author":"C Oh","year":"2022","unstructured":"Oh, C., Naik, N., Daw, Z., Wang, T.E., Nuzzo, P.: ARACHNE: automated validation of assurance cases with stochastic contract networks. In: Trapp, M., Saglietti, F., Spisl\u00e4nder, M., Bitsch, F. (eds.) SAFECOMP 2022. LNCS, vol. 13414, pp. 65\u201381. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-14835-4_5"},{"key":"12_CR20","unstructured":"Holloway, C.M.: Explicate\u201978: uncovering the implicit assurance case in DO-178C. In: Safety-Critical Systems Symposium (2015)"},{"key":"12_CR21","unstructured":"The GSN Working Group Online, Goal Structuring Notation. http:\/\/www.goalstructuringnotation.info\/"},{"key":"12_CR22","unstructured":"Adelard LLP. Claims, Arguments and Evidence (CAE) (2019). https:\/\/www.adelard.com\/asce\/choosing-asce\/cae.html. Accessed 23 Oct 2020"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Fujita, H., Matsuno, Y., et al.: DS-Bench toolset: tools for dependability benchmarking with simulation and assurance. In: International Conference on Dependable Systems and Networks, pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/DSN.2012.6263915"},{"issue":"2\u20133","key":"12_CR24","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1561\/1000000053","volume":"12","author":"A Benveniste","year":"2018","unstructured":"Benveniste, A., Caillaud, B., et al.: Contracts for system design. Found. Trends Electron. Des. Autom. 12(2\u20133), 124\u2013400 (2018)","journal-title":"Found. Trends Electron. Des. Autom."},{"key":"12_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-642-28872-2_3","volume-title":"Fundamental Approaches to Software Engineering","author":"SS Bauer","year":"2012","unstructured":"Bauer, S.S., et al.: Moving from specifications to contracts in component-based design. In: de Lara, J., Zisman, A. (eds.) FASE 2012. LNCS, vol. 7212, pp. 43\u201358. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28872-2_3"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Gacek, A., Backes, J., et al.: Resolute: an assurance case language for architecture models. In: SIGAda Annual Conference on High Integrity Language Technology, pp. 19\u201328 (2014)","DOI":"10.1145\/2692956.2663177"},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-031-06773-0_9","volume-title":"NASA Formal Methods","author":"TE Wang","year":"2022","unstructured":"Wang, T.E., Daw, Z., Nuzzo, P., Pinto, A.: Hierarchical contract-based synthesis for assurance cases. In: Deshmukh, J.V., Havelund, K., Perez, I. (eds.) NFM 2022. LNCS, vol. 13260, pp. 175\u2013192. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06773-0_9"},{"key":"12_CR28","volume-title":"Introduction to Bayesian Networks","author":"FV Jensen","year":"1996","unstructured":"Jensen, F.V.: Introduction to Bayesian Networks, 1st edn. Springer, Heidelberg (1996)","edition":"1"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.engappai.2017.01.011","volume":"60","author":"K Verbert","year":"2017","unstructured":"Verbert, K., Babu\u0161ka, R., De Schutter, B.: Bayesian and Dempster-Shafer reasoning for knowledge-based fault diagnosis\u2013a comparative study. Eng. Appl. Artif. Intell. 60, 136\u2013150 (2017)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"12_CR30","unstructured":"ArduPilot Dev Team. Arducopter (2023). https:\/\/ardupilot.org\/copter\/"},{"key":"12_CR31","unstructured":"Shankar, N., Bhatt, D., et al.: DesCert: Design for certification. arXiv preprint arXiv:2203.15178 (2022)"},{"key":"12_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1007\/978-3-031-06773-0_31","volume-title":"NASA Formal Methods","author":"D Bhatt","year":"2022","unstructured":"Bhatt, D., Ren, H., Murugesan, A., Biatek, J., Varadarajan, S., Shankar, N.: Requirements-driven model checking and test generation for comprehensive verification. In: Deshmukh, J.V., Havelund, K., Perez, I. (eds.) NFM 2022. LNCS, vol. 13260, pp. 576\u2013596. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06773-0_31"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40953-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T17:04:44Z","timestamp":1694624684000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40953-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031409523","9783031409530"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40953-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"14 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"42","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2023.cnrs.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops, 35 out of 49 papers have been accepted","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}