{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:57:46Z","timestamp":1742993866233,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319195834"},{"type":"electronic","value":"9783319195841"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19584-1_11","type":"book-chapter","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T15:56:31Z","timestamp":1433951791000},"page":"162-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases"],"prefix":"10.1007","author":[{"given":"Omar","family":"Jaradat","sequence":"first","affiliation":[]},{"given":"Iain","family":"Bate","sequence":"additional","affiliation":[]},{"given":"Sasikumar","family":"Punnekkat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,9]]},"reference":[{"key":"11_CR1","unstructured":"SAE ARP4761 Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment, December 1996"},{"key":"11_CR2","unstructured":"Modular software safety case (MSSC) \u2013 process description, November 2012. https:\/\/www.amsderisc.com\/related-programmes\/"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-540-78929-1_5","volume-title":"Hybrid Systems: Computation and Control","author":"L Benvenuti","year":"2008","unstructured":"Benvenuti, L., Ferrari, A., Mazzi, E., Vincentelli, A.L.S.: Contract-based design for computation and verification of a closed-loop hybrid system. In: Egerstedt, M., Mishra, B. (eds.) HSCC 2008. LNCS, vol. 4981, pp. 58\u201371. Springer, Heidelberg (2008)"},{"key":"11_CR4","volume-title":"Probabilistic techniques in Exposure assessment","author":"A Cullen","year":"1999","unstructured":"Cullen, A., Frey, H.: Probabilistic techniques in Exposure assessment. Plenum Press, New York (1999)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Fenn, J.L., Hawkins, R.D., Williams, P., Kelly, T.P., Banner, M.G., Oakshott, Y.: The who, where, how, why and when of modular and incremental certification. In: Proceedings of the 2nd IET International Conference on System Safety, pp. 135\u2013140. IET (2007)","DOI":"10.1049\/cp:20070454"},{"key":"11_CR6","unstructured":"GSN Community Standard: Version 1; (c) 2011 Origin Consulting (York) Limited. http:\/\/www.goalstructuringnotation.info\/"},{"key":"11_CR7","unstructured":"ISO 26262:2011. Road Vehicles \u2013 Functional Safety, Part 1\u20139. International Organization for Standardization, November 2011"},{"key":"11_CR8","unstructured":"Jaradat, O., Graydon, P.J., Bate, I.: An approach to maintaining safety case evidence after a system change. In: Proceedings of the 10th European Dependable Computing Conference (EDCC), August 2014"},{"key":"11_CR9","unstructured":"Kelly, T.: Literature survey for work on evolvable safety cases. Department of Computer Sceince, University of York, 1st Year Qualifying Dissertation (1995)"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-48249-0_2","volume-title":"Computer Safety, Reliability and Security","author":"TP Kelly","year":"1999","unstructured":"Kelly, T.P., McDermid, J.A.: A systematic approach to safety case maintenance. In: Felici, M., Kanoun, K., Pasquini, A. (eds.) SAFECOMP 1999. LNCS, vol. 1698, pp. 13\u201326. Springer, Heidelberg (1999)"},{"key":"11_CR11","unstructured":"Lisagor, O., Pretzer, M., Seguin, C., Pumfrey, D.J., Iwu, F., Peikenkamp, T.: Towards safety analysis of highly integrated technologically heterogeneous systems - a domain-based approach for modelling system failure logic. In: The 24th International System Safety Conference (ISSC), Albuquerque, USA (2006)"},{"key":"11_CR12","volume-title":"Object-Oriented Software Construction","author":"B Meyer","year":"1988","unstructured":"Meyer, B.: Object-Oriented Software Construction, 1st edn. Prentice-Hall Inc, Upper Saddle River (1988)","edition":"1"},{"issue":"2","key":"11_CR13","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0169-5150(96)01217-0","volume":"16","author":"DJ Pannell","year":"1997","unstructured":"Pannell, D.J.: Sensitivity analysis of normative economic models: theoretical framework and practical strategies. Agricultural Economics 16(2), 139\u2013152 (1997)","journal-title":"Agricultural Economics"},{"key":"11_CR14","volume-title":"System Reliability Theory: Models, Statistical Methods and Applications","author":"M Rausand","year":"2004","unstructured":"Rausand, M., H\u00f8yland, A.: System Reliability Theory: Models, Statistical Methods and Applications. Wiley-Interscience, Hoboken (2004)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Wilson, S.P., Kelly, T.P., McDermid, J.A.: Safety case development: current practice, future prospects. In: proc. of Software Bases Systems - 12th Annual CSR Workshop. Springer-Verlag (1997)","DOI":"10.1007\/978-1-4471-0921-1_6"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technologies \u2013 Ada-Europe 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19584-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T02:01:20Z","timestamp":1676944880000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19584-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319195834","9783319195841"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19584-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}