{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:25:18Z","timestamp":1759134318239},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319105567"},{"type":"electronic","value":"9783319105574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10557-4_21","type":"book-chapter","created":{"date-parts":[[2014,8,27]],"date-time":"2014-08-27T12:12:24Z","timestamp":1409141544000},"page":"180-191","source":"Crossref","is-referenced-by-count":9,"title":["Towards Trust Assurance and Certification in Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Schneider","sequence":"first","affiliation":[]},{"given":"Eric","family":"Armengaud","sequence":"additional","affiliation":[]},{"given":"Erwin","family":"Schoitsch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Schneider, D., Trapp, M.: Conditional Safety Certification of Open Adaptive Systems. ACM Trans. Auton. Adapt. Syst.\u00a08(2), Article 8, 20 pages (2013)","DOI":"10.1145\/2491465.2491467"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Althammer, E., Schoitsch, E., Eriksson, H., Vinter, J.: The DECOS Concept of Generic Safety Cases - A Step towards Modular Certification. In: Proceedings of the 35th Euromicro Conference on Software Engineering and Advanced Applications, pp. 537\u2013545 (2009)","DOI":"10.1109\/SEAA.2009.55"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Schneider, D., Trapp, M.: Conditional Safety Certificates in Open Systems. In: Proceedings of the 1st Workshop on Critical Automotive Applications: Robustness & Safety (CARS 2010). ACM (2010)","DOI":"10.1145\/1772643.1772660"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Fenn, J., Hawkins, R., Kelly, T.P., Williams, P.: Safety Case Composition Using Contracts \u2013 Refinements Based on Feedback from an Industrial Case Study. In:15th Safety Critical Systems Symposium (2007)","DOI":"10.1007\/978-1-84628-806-7_9"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/3-540-45732-1_31","volume-title":"Computer Safety, Reliability and Security","author":"I. Bate","year":"2002","unstructured":"Bate, I., Kelly, T.P.: Architectural considerations in the certification of modular systems. In: Anderson, S., Bologna, S., Felici, M. (eds.) SAFECOMP 2002. LNCS, vol.\u00a02434, pp. 321\u2013333. Springer, Heidelberg (2002)"},{"key":"21_CR6","unstructured":"IEC 61508, Ed. 2.0, 2010, Part 1-7. Functional safety of electrical\/electronic\/programmable electronic safety related systems, International Electrotechnical Commission"},{"key":"21_CR7","unstructured":"Kelly, T.P, Concepts and Principles of Compositional Safety Cases. COMSA\/2001\/1\/1, Research Report commissioned by QinetiQ (2001)"},{"key":"21_CR8","unstructured":"Rushby, J.: Modular certification. NASA Contractor Report CR-2002-212130, NASA Langley Research Center (2002)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Rushby, J.: Just-in-Time Certification. In: proceedings of the 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007), pp. 15\u201324 (2007)","DOI":"10.1109\/ICECCS.2007.26"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-540-89247-2_2","volume-title":"Runtime Verification","author":"J. Rushby","year":"2008","unstructured":"Rushby, J.: Runtime certification. In: Leucker, M. (ed.) RV 2008. LNCS, vol.\u00a05289, pp. 21\u201335. Springer, Heidelberg (2008)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Schneider, D., Trapp, M.: A Safety Engineering Framework for Open Adaptive Systems. In: Proc. of the Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO (2011)","DOI":"10.1109\/SASO.2011.20"},{"key":"21_CR12","unstructured":"Moore, G.E.: Cramming more components onto integrated circuits. Electronics Magazine, 4 (1965) ISSIN 0883-4989"},{"key":"21_CR13","first-page":"53","volume-title":"Proceedings of the Eleventh Australian Workshop on Safety Critical Systems and Software, SCS 2006","author":"T. Kelly","year":"2006","unstructured":"Kelly, T.: Using software architecture techniques to support the modular certification of safety-critical systems. In: Proceedings of the Eleventh Australian Workshop on Safety Critical Systems and Software, SCS 2006, vol.\u00a063, pp. 53\u201365. Australian Computer Society, Inc., Darlinghurst (2006)"},{"key":"21_CR14","unstructured":"IEC 62443: Industrial communication networks - Network and system security. International Electrotechnical Commission"},{"key":"21_CR15","unstructured":"ISO\/IEC:27002: Information technology - security techniques - Code of practice for information security management. International Organization for Standardization (ISO), International Electrotechnical Commission (IEC)"},{"key":"21_CR16","unstructured":"ISO\/IEC 27005, Information technology \u2014 Security techniques \u2014 Information security risk management. International Organization for Standardization (ISO), International Electrotechnical Commission, IEC (2008)"},{"key":"21_CR17","unstructured":"SafeCer (Safety Certification Safety Certification of Software-intensive Systems with Reusable Components), ARTEMIS project n\u00b0 269265\/295373 (pSafeCer\/nSafeCer), \n                    \n                      http:\/\/www.safecer.eu"},{"key":"21_CR18","unstructured":"7. OPENCOSS (Open Platform for EvolutioNary Certification Of Safety-critical Systems), European Integrated Project in FP7 , \n                    \n                      http:\/\/www.opencoss-project.eu"},{"key":"21_CR19","unstructured":"ISO 26262 (2011\/2012), Part 1- 10, \u201cRoad vehicles \u2013 functional safety\u201d"},{"key":"21_CR20","unstructured":"Schoitsch, E.: Safety and\/vs. Security: Towards a System Engineering approach for Trust? In: Proceedings of ISSC 2013 (31st International Systems Safety Conference), IEEE Conference Proceedings, Boston, USA, August 12-16, System Safety Society, Boston (2013), Paper #134 in electronic proceedings, ISBN 978-0-9858710-1-7"},{"key":"21_CR21","unstructured":"IEC 62741\/Ed1, 2013: Reliability of systems, equipment and components. Guide to the demonstration of dependability requirements. The dependability case"},{"key":"21_CR22","unstructured":"IEC\/PAS 62814\/Ed1, 2013: Dependability of Software Products Containing Reusable Components \u2013 Guidance for Functionality and Tests"},{"key":"21_CR23","unstructured":"ISO 15408, 2009: Information technology \u2013 Security techniques \u2013 Evaluation criteria for IT security"},{"key":"21_CR24","unstructured":"SESAMO (Security and Safety Modelling), \n                    \n                      http:\/\/www.sesamo-project.eu"},{"key":"21_CR25","series-title":"LNCS","first-page":"311","volume-title":"SAFECOMP 2014","author":"C. Schmittner","year":"2014","unstructured":"Schmittner, C., Gruber, T., Puschner, P., Schoitsch, E.: Security application of failure mode and effect analysis (FMEA). In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol.\u00a08666, pp. 311\u2013326. Springer, Heidelberg (2014)"},{"key":"21_CR26","unstructured":"Steiner, M., Liggesmeyer, P.: Combination of Safety and Security Analysis - Finding Security Problems That Threaten The Safety of a System. In: SAFECOMP 2013 - Workshop DECS (ERCIM\/EWICS Workshop on Dependable Embedded and Cyber-physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security (2013)"},{"key":"21_CR27","unstructured":"Roth, M., Liggesmeyer, P.: Modeling and Analysis of Safety-Critical Cyber Physical Systems using State\/Event Fault Trees. In: SAFECOMP 2013 - Workshop DECS (2013)"},{"key":"21_CR28","unstructured":"ACROSS (Artemis project: ARTEMIS CROSS-Domain Architecture), \n                    \n                      http:\/\/www.across-project.eu"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Ebert, C., Jones, C.: Embedded Software: Facts, Figures and Future, pp. 42\u201352. IEEE Computer Society (2009)","DOI":"10.1109\/MC.2009.118"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10557-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T17:41:22Z","timestamp":1558978882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10557-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319105567","9783319105574"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10557-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}