{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:28:44Z","timestamp":1773329324259,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031687372","type":"print"},{"value":"9783031687389","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68738-9_13","type":"book-chapter","created":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:02:40Z","timestamp":1725836560000},"page":"173-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enabling Theory-Based Continuous Assurance: A Coherent Approach with\u00a0Semantics and\u00a0Automated Synthesis"],"prefix":"10.1007","author":[{"given":"Srivatsan","family":"Varadarajan","sequence":"first","affiliation":[]},{"given":"Robin","family":"Bloomfield","sequence":"additional","affiliation":[]},{"given":"John","family":"Rushby","sequence":"additional","affiliation":[]},{"given":"Gopal","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Anitha","family":"Murugesan","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Stroud","sequence":"additional","affiliation":[]},{"given":"Kateryna","family":"Netkachova","sequence":"additional","affiliation":[]},{"given":"Isaac Hong","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Joaqu\u00edn","family":"Arias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"13_CR1","unstructured":"Adelard: Claims Arguments Evidence. https:\/\/claimsargumentsevidence.org\/"},{"key":"13_CR2","unstructured":"Adelard LLP: Assurance and Safety Case Environment. http:\/\/www.adelard.com\/asce"},{"issue":"3\u20134","key":"13_CR3","first-page":"337","volume":"18","author":"J Arias","year":"2018","unstructured":"Arias, J., Carro, M., Salazar, E., Marple, K., Gupta, G.: Constraint answer set programming without grounding. TPLP 18(3\u20134), 337\u2013354 (2018)","journal-title":"TPLP"},{"key":"13_CR4","unstructured":"Bloomfield, R., Netkatchova, K., Rushby, J.: Defeaters and Eliminative Argumentation in CLARISSA. arXiv preprint (2024). https:\/\/arxiv.org\/abs\/2405.15800"},{"key":"13_CR5","unstructured":"Bloomfield, R., Rushby, J.: Assurance 2.0: a manifesto. arXiv preprint (2021). https:\/\/arxiv.org\/abs\/2004.10474v3"},{"key":"13_CR6","unstructured":"Bloomfield, R., Rushby, J.: Assessing Confidence with Assurance 2.0. arXiv preprint (2024). https:\/\/arxiv.org\/abs\/2205.04522v4"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Chowdhury, T., Lin, C., Kim, B., Lawford, M., Shiraishi, S., Wassyng, A.: Principles for systematic development of an assurance case template from ISO 26262. In: Proceedings - 2017 IEEE 28th International Symposium on Software Reliability Engineering Workshops, ISSREW 2017 (2017)","DOI":"10.1109\/ISSREW.2017.14"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-54624-2_13","volume-title":"Specification, Algebra, and Software","author":"S Cruanes","year":"2014","unstructured":"Cruanes, S., Heymans, S., Mason, I., Owre, S., Shankar, N.: The semantics of datalog for the evidential tool bus. In: Iida, S., Meseguer, J., Ogata, K. (eds.) Specification, Algebra, and Software. LNCS, vol. 8373, pp. 256\u2013275. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54624-2_13"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Daw, Z., et al.: AACE: automated assurance case environment for aerospace certification. In: 2023 IEEE\/AIAA 42nd Digital Avionics Systems Conference (DASC) (2023)","DOI":"10.1109\/DASC58513.2023.10311298"},{"key":"13_CR10","unstructured":"Defense Advanced Research Projects Agency (DARPA): Automated Rapid Certification Of Software (ARCOS). https:\/\/www.darpa.mil\/program\/automated-rapid-certification-of-software"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-40793-2_3","volume-title":"Computer Safety, Reliability, and Security","author":"E Denney","year":"2013","unstructured":"Denney, E., Pai, G.: A formal basis for safety case patterns. In: Bitsch, F., Guiochet, J., Ka\u00e2niche, M. (eds.) SAFECOMP 2013. LNCS, vol. 8153, pp. 21\u201332. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40793-2_3"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-642-33675-1_2","volume-title":"Computer Safety, Reliability, and Security","author":"E Denney","year":"2012","unstructured":"Denney, E., Pai, G., Pohl, J.: AdvoCATE: an assurance case automation toolset. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol. 7613, pp. 8\u201321. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33675-1_2"},{"key":"13_CR13","unstructured":"Fortiss: Evidential Tool Bus (ETB) (2024). https:\/\/www.fortiss.org\/en\/research\/projects\/detail\/evidential-tool-bus"},{"key":"13_CR14","unstructured":"Murugesan, A., et al.: Semantic analysis of assurance cases using s(CASP). In: Goal Directed Execution of Answer Set Programs (GDE) Workshop in ICLP (2023)"},{"key":"13_CR15","unstructured":"Murugesan, A., et al.: Automating semantic analysis of system assurance cases using goal-directed ASP. In: Submitted to the International Conference on Logic Programming (ICLP) (2024)"},{"key":"13_CR16","unstructured":"Radio Technical Commission for Aeronautics (RTCA): DO-178C: Software Considerations in Airborne Systems and Equipment Certification"},{"key":"13_CR17","unstructured":"Safety-Critical Systems Club\u2019s (SCSC) Assurance Case Working Group (ACWG): Goal Structuring Notation(GSN). https:\/\/scsc.uk\/gsn"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Shankar, N., et al.: Continuous safety & security evidence generation, curation and assurance case construction using the evidential tool bus. In: To appear in 43rd AIAA\/IEEE Digital Avionics Systems Conference (DASC) (2024)","DOI":"10.1109\/DASC62030.2024.10749275"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Varadarajan, S., et al.: Clarissa: foundations, tools & automation for assurance cases. In: 42nd AIAA\/IEEE Digital Avionics Systems Conference (DASC) (2023)","DOI":"10.1109\/DASC58513.2023.10311213"},{"key":"13_CR20","unstructured":"Varadarajan, S., et al.: Consistent logical automated reasoning for integrated system software assurance (CLARISSA). DARPA ARCOS Final Report. To appear shortly. Technical report (2024)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68738-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T22:12:03Z","timestamp":1732745523000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68738-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031687372","9783031687389"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68738-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"9 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Florence","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"43","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.safecomp2024.unifi.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}