{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T11:10:03Z","timestamp":1746357003190,"version":"3.40.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319105567"},{"type":"electronic","value":"9783319105574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10557-4_13","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T12:12:24Z","timestamp":1409141544000},"page":"97-107","source":"Crossref","is-referenced-by-count":1,"title":["Proving Compliance of Implementation Models to Safety Specifications"],"prefix":"10.1007","author":[{"given":"Markus","family":"Oertel","sequence":"first","affiliation":[]},{"given":"Omar","family":"Kacimi","sequence":"additional","affiliation":[]},{"given":"Eckard","family":"B\u00f6de","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Baumgart, A., B\u00f6de, E., B\u00fcker, M., Damm, W., Ehmen, G., Gezgin, T., Henkler, S., Hungar, H., Josko, B., Oertel, M., Peikenkamp, T., Reinkemeier, P., Stierand, I., Weber, R.: Architecture modeling. Tech. rep., OFFIS (March 2011)"},{"key":"13_CR2","unstructured":"Benveniste, A., Caillaud, B., Nickovic, D., Passerone, R., baptiste Raclet, J., Reinkemeier, P., Sangiovanni-vincentelli, A., Damm, W., Henzinger, T., Larsen, K.: Contracts for systems design. Tech. rep., Research Centre Rennes \u2013 Bretagne Atlantique (2012)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-39878-3_5","volume-title":"Computer Safety, Reliability, and Security","author":"M. Bozzano","year":"2003","unstructured":"Bozzano, M., Villafiorita, A.: Improving system reliability via model checking: The FSAP\/NuSMV-SA safety analysis platform. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol.\u00a02788, pp. 49\u201362. Springer, Heidelberg (2003)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Damm, W., Hungar, H., Josko, B., Peikenkamp, T., Stierand, I.: Using contract-based component specifications for virtual integration testing and architecture design. In: Design, Automation Test in Europe Conference Exhibition (2011)","DOI":"10.1109\/DATE.2011.5763167"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Echtle, K.: Fehlertoleranzverfahren. Springer (1990)","DOI":"10.1007\/978-3-642-75765-5"},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10664-006-5964-9","volume":"11","author":"M. Ellims","year":"2006","unstructured":"Ellims, M., Bridges, J., Ince, D.: The economics of unit testing. Empirical Software Engineering\u00a011(1), 5\u201331 (2006)","journal-title":"Empirical Software Engineering"},{"key":"13_CR7","unstructured":"Hungar, H.: Compositionality with strong assumptions. In: Nordic Workshop on Programming Theory (November 2011)"},{"key":"13_CR8","unstructured":"ISO: Road Vehicles - Functional Safety. International Standard Organization, iSO 26262 (November 2011)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/11563228_10","volume-title":"Computer Safety, Reliability, and Security","author":"A. Joshi","year":"2005","unstructured":"Joshi, A., Heimdahl, M.P.E.: Model-based safety analysis of simulink models using SCADE design verifier. In: Winther, R., Gran, B.A., Dahll, G. (eds.) SAFECOMP 2005. LNCS, vol.\u00a03688, pp. 122\u2013135. Springer, Heidelberg (2005)"},{"key":"13_CR10","unstructured":"Kacimi, O., Ellen, C., Oertel, M., Sojka, D.: Creating a reference technology platform: Performing model-based safety analysis in an heterogeneous development environment. In: Proceedings of the MODELSWARD Conference (2014)"},{"key":"13_CR11","volume-title":"Reliability engineering handbook","author":"D. Kececioglu","year":"1991","unstructured":"Kececioglu, D.: Reliability engineering handbook, vol.\u00a0i. PTR Prentice Hall, Englewood Cliffs (1991)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-58468-4_159","volume-title":"Formal Techniques in Real-Time and Fault-Tolerant Systems","author":"L. Lamport","year":"1994","unstructured":"Lamport, L., Merz, S.: Specifying and verifying fault-tolerant systems. In: Langmaack, H., de Roever, W.-P., Vytopil, J. (eds.) FTRTFT 1994 and ProCoS 1994. LNCS, vol.\u00a0863, pp. 41\u201376. Springer, Heidelberg (1994)"},{"key":"13_CR13","unstructured":"Oertel, M., Mahdi, A., B\u00f6de, E., Rettberg, A.: Contract-based safety: Specification and application guidelines. In: Proceedings of the 1st International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (2014)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Papadopoulos, Y., Maruhn, M.: Model-based synthesis of fault trees from matlab-simulink models. In: International Conference on Dependable Systems and Networks, DSN 2001, pp. 77\u201382 (2001)","DOI":"10.1109\/DSN.2001.941393"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48249-0_13","volume-title":"Computer Safety, Reliability and Security","author":"Y. Papadopoulos","year":"1999","unstructured":"Papadopoulos, Y., McDermid, J.A.: Hierarchically performed hazard origin and propagation studies. In: Felici, M., Kanoun, K., Pasquini, A. (eds.) SAFECOMP 1999. LNCS, vol.\u00a01698, pp. 139\u2013152. Springer, Heidelberg (1999)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/11875567_21","volume-title":"Computer Safety, Reliability, and Security","author":"T. Peikenkamp","year":"2006","unstructured":"Peikenkamp, T., Cavallo, A., Valacca, L., B\u00f6de, E., Pretzer, M., Hahn, E.M.: Towards a unified model-based safety assessment. In: G\u00f3rski, J. (ed.) SAFECOMP 2006. LNCS, vol.\u00a04166, pp. 275\u2013288. Springer, Heidelberg (2006)"},{"key":"13_CR17","unstructured":"RTCA: DO-178C: Software Considerations in Airborne Systems and Equipment Certification. Radio Technical Commission for Aeronautics (RTCA) (2011)"},{"key":"13_CR18","unstructured":"SAE: ARP4761: Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment (1996)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b94154","volume-title":"FME 2003: Formal Methods","author":"A. Sch\u00e4fer","year":"2003","unstructured":"Sch\u00e4fer, A.: Combining real-time model-checking and fault tree analysis. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol.\u00a02805, Springer, Heidelberg (2003)"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-15651-9_16","volume-title":"Computer Safety, Reliability, and Security","author":"R. Svenningsson","year":"2010","unstructured":"Svenningsson, R., Vinter, J., Eriksson, H., T\u00f6rngren, M.: MODIFI: A MODel-Implemented Fault Injection Tool. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol.\u00a06351, pp. 210\u2013222. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10557-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T10:51:52Z","timestamp":1746355912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10557-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319105567","9783319105574"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10557-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}