{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T21:47:43Z","timestamp":1759614463417},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118536"},{"type":"electronic","value":"9783319118543"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11854-3_54","type":"book-chapter","created":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T06:09:04Z","timestamp":1409033344000},"page":"617-629","source":"Crossref","is-referenced-by-count":4,"title":["The Method of D-Case Development Using HAZOP Analysis on UML Models"],"prefix":"10.1007","author":[{"given":"Feng","family":"Ding","sequence":"first","affiliation":[]},{"given":"Shuichiro","family":"Yamamoto","sequence":"additional","affiliation":[]},{"given":"Nda","family":"Abrahim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","unstructured":"ISSRE, The 3rd International Workshop on Open Systems Dependability: Adaptation to Changing World (2013), \n                    \n                      http:\/\/www.ubicg.ynu.ac.jp\/wosd\/wosd2013\/index.html"},{"key":"54_CR2","unstructured":"\u677e\u91ce\u88d5,\u9ad8\u4e95\u5229\u61b2,\u5c71\u672c\u4fee\u4e00\u90ce,D-Case\u5165\u9580\u301c\u30c7\u30a3\u30da\u30f3\u30c0\u30d3\u30ea\u30c6\u30a3\u30fb\u30b1\u30fc\u30b9\u3092\u304b\u3044\u3066\u3082\u3088\u3046!\u301c.\u682a\u5f0f\u4f1a\u793e\u30c0\u30a4\u30c6\u30c3\u30af\u30db\u30fc\u30eb\u30c7\u30a3\u30f3\u30b0 (2012) ISBN978-4-86293-079-8"},{"key":"54_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/978-3-642-32498-7_48","volume-title":"Multidisciplinary Research and Practice for Information Systems","author":"Y. Matsuno","year":"2012","unstructured":"Matsuno, Y., Yamamoto, S.: Consensus building and in-operation assurance for service dependability. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol.\u00a07465, pp. 639\u2013653. Springer, Heidelberg (2012)"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Matsuno, Y., Nakazawa, J., Takeyama, M., Sugaya, M., Ishikawa, Y.: Toward a language for communication among stakeholders. In: Proc. of the 16th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2010), pp. 93\u2013100 (2010)","DOI":"10.1109\/PRDC.2010.47"},{"key":"54_CR5","unstructured":"Object-oriented systems analysis and design using UML, Bennett S, pp.21\u201350"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Leveson, N.G., Heimdahl, M.P.E., Reese, J.D.: Designing specification languages for process control systems: Lessons learned and steps to the future. In: Wang, J., Lemoine, M. (eds.) ESEC\/FSE 1999. LNCS, vol.\u00a01687, pp. 127\u2013146. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48166-4_9"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Reifer, D.: Software Failure Modes and Effects Analysis. IEEE Transactions on Reliability\u00a0R-38(3) (1979)","DOI":"10.1109\/TR.1979.5220578"},{"key":"54_CR8","unstructured":"Ministry of Defence. HAZOP studies on systems containing programmable electronics. Defence Standard 00-58, Parts 1 and 2, Issue 2 (May 2000)"},{"key":"54_CR9","unstructured":"Hansen, K.M., Wells, L., Maier, T.: HAZOP Analysis of UML-Based Software Architecture Descriptions of Safety-Critical Systems"},{"key":"54_CR10","unstructured":"Habli, I., Ibarra, I., Rivett, R., Kelly, T.: Model-Based Assurance for Justifying Automotive Functional Safety"},{"key":"54_CR11","unstructured":"\u5c71\u672c\u4fee\u4e00\u90ce, \u677e\u91ce\u88d5,\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u5206\u6790\u306b\u57fa\u3065\u304f\u30c7\u30a3\u30da\u30f3\u30c0\u30d3\u30ea\u30c6\u30a3\u30b1\u30fc\u30b9\u4f5c\u6210\u6cd5\u306e\u63d0 \u6848, KBSE \u7814\u7a76\u4f1a,\u4fe1\u5b66\u6280\u5831, BSE2012-61, vol. 112(419), pp. 19-24, (2013); KBSE2012-61, \u5e741 \u6708"},{"key":"54_CR12","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 2nd edn. Addison-Wesley (2003)"},{"key":"54_CR13","unstructured":"Hansen, K.M., Wells, L., Maier, T.: HAZOP Analysis of UML-Based Software Architecture Descriptions of Safety-Critical Systems"},{"key":"54_CR14","unstructured":"Sequence Diagram Wikipedia, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Sequence_diagram"},{"key":"54_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-45732-1_10","volume-title":"Computer Safety, Reliability and Security","author":"K. Lano","year":"2002","unstructured":"Lano, K., Clark, D., Androutsopoulos, K.: Safety and security analysis of object-oriented models. In: Anderson, S., Bologna, S., Felici, M. (eds.) SAFECOMP 2002. LNCS, vol.\u00a02434, pp. 82\u201393. Springer, Heidelberg (2002)"}],"container-title":["Communications in Computer and Information Science","Knowledge-Based Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11854-3_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T17:56:13Z","timestamp":1558979773000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11854-3_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118536","9783319118543"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11854-3_54","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}