{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T19:05:39Z","timestamp":1743879939022},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319105055"},{"type":"electronic","value":"9783319105062"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10506-2_12","type":"book-chapter","created":{"date-parts":[[2014,9,2]],"date-time":"2014-09-02T22:41:50Z","timestamp":1409697710000},"page":"170-185","source":"Crossref","is-referenced-by-count":18,"title":["Generation of Safety Case Argument-Fragments from Safety Contracts"],"prefix":"10.1007","author":[{"given":"Irfan","family":"Sljivo","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Gallina","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Carlson","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Hansson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"CHESS-toolset: \n                    \n                      http:\/\/www.chess-project.org\/page\/download"},{"key":"12_CR2","unstructured":"GSN Community Standard Version 1. Technical report, Origin Consulting (York) Limited (November 2011)"},{"key":"12_CR3","unstructured":"Armengaud, E.: Automated safety case compilation for product-based argumentation. In: Embedded Real Time Software and Systems (ERTS) (February 2014)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bate, I., Conmy, P.: Assuring Safety for Component Based Software Engineering. In: 15th IEEE International Symposium on High Assurance Systems Engineering (HASE) (January 2014)","DOI":"10.1109\/HASE.2014.25"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bate, I., Hansson, H., Punnekkat, S.: Better, faster, cheaper, and safer too - is this really possible? In: 17th IEEE Int\u2019l Conf. on Emerging Technologies for Factory Automation (ETFA). IEEE (September 2012)","DOI":"10.1109\/ETFA.2012.6489706"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-92188-2_9","volume-title":"Formal Methods for Components and Objects","author":"A. Benveniste","year":"2008","unstructured":"Benveniste, A., Caillaud, B., Ferrari, A., Mangeruca, L., Passerone, R., Sofronis, C.: Multiple viewpoint contract-based specification and design. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2007. LNCS, vol.\u00a05382, pp. 200\u2013225. Springer, Heidelberg (2008)"},{"key":"12_CR7","unstructured":"Carlson, J., et al.: Generic component meta-mode, Version 1.0 SafeCer, Deliverable D132 (November 2013)"},{"key":"12_CR8","unstructured":"Dardar, R.: Building a Safety Case in Compliance with ISO 26262 for Fuel Level Estimation and Display System. Master\u2019s thesis, M\u00e4lardalen University, School of Innovation, Design and Engineering, V\u00e4ster\u00e5s, Sweden (2014)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-27654-5","volume-title":"SAFECOMP 2012","author":"E. Denney","year":"2012","unstructured":"Denney, E., Pai, G.: A lightweight methodology for safety case assembly. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol.\u00a07612, pp. 1\u201312. Springer, Heidelberg (2012)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Fenn, J.L., Hawkins, R.D., Williams, P., Kelly, T.P., Banner, M.G., Oakshott, Y.: The who, where, how, why and when of modular and incremental certification. In: 2nd International Conference on System Safety (ICSS). IET (2007)","DOI":"10.1049\/cp:20070454"},{"key":"12_CR11","unstructured":"Greenwell, W.S., Knight, J.C., Holloway, C.M., Pease, J.J.: A taxonomy of fallacies in system safety arguments. In: 24th International System Safety Conference, ISSC (2006)"},{"key":"12_CR12","unstructured":"ISO 26262-10. Road vehicles \u2014 Functional safety \u2014 Part 10: Guideline on ISO 26262. International Organization for Standardization (2011)"},{"key":"12_CR13","unstructured":"Rushby, J.: Logic and epistemology in safety cases. In: Bitsch, F., Guiochet, J., Ka\u00e2niche, M. (eds.) SAFECOMP 2013. LNCS, vol.\u00a08153, pp. 1\u20137. Springer, Heidelberg (2013)"},{"key":"12_CR14","unstructured":"Sljivo, I., Carlson, J., Gallina, B., Hansson, H.: Fostering Reuse within Safety-critical Component-based Systems through Fine-grained Contracts. In: International Workshop on Critical Software Component Reusability and Certification across Domains (CSC) (June 2013)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Sljivo, I., Gallina, B., Carlson, J., Hansson, H.: Strong and weak contract formalism for third-party component reuse. In: IEEE 3rd International Workshop on Software Certification (WoSoCer) (November 2013)","DOI":"10.1109\/ISSREW.2013.6688921"},{"key":"12_CR16","unstructured":"Storey, N.R.: Safety Critical Computer Systems. Addison-Wesley Longman Publishing Co., Inc., Boston (1996)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-24270-0_3","volume-title":"Computer Safety, Reliability, and Security","author":"B. Zimmer","year":"2011","unstructured":"Zimmer, B., B\u00fcrklen, S., Knoop, M., H\u00f6fflinger, J., Trapp, M.: Vertical safety interfaces\u2013improving the efficiency of modular certification. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol.\u00a06894, pp. 29\u201342. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10506-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:23:45Z","timestamp":1558970625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10506-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319105055","9783319105062"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10506-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}