{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:20:42Z","timestamp":1769743242800,"version":"3.49.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319242545","type":"print"},{"value":"9783319242552","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24255-2_24","type":"book-chapter","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T09:51:13Z","timestamp":1441446673000},"page":"328-343","source":"Crossref","is-referenced-by-count":13,"title":["Towards a Formal Basis for Modular Safety Cases"],"prefix":"10.1007","author":[{"given":"Ewen","family":"Denney","sequence":"first","affiliation":[]},{"given":"Ganesh","family":"Pai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Despotou, G., Kelly, T.: Investigating the use of argument modularity to optimise through-life system safety assurance. In: 3rd IET International Conference on System Safety, pp. 1\u20136, October 2008","DOI":"10.1049\/cp:20080746"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-1-4471-0653-1_6","volume-title":"Current Issues in Safety-Critical Systems","author":"T Kelly","year":"2003","unstructured":"Kelly, T.: Managing complex safety cases. In: Redmill, F., Anderson, T. (eds.) Current Issues in Safety-Critical Systems, pp. 99\u2013115. Springer, London (2003)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Fenn, J., Hawkins, R., Williams, P., Kelly, T., Banner, M., Oakshott, Y.: The who, where, how, why and when of modular and incremental certification. In: 2nd IET International Conference on System Safety, pp. 135\u2013140, October 2007","DOI":"10.1049\/cp:20070454"},{"key":"24_CR4","unstructured":"Goal Structuring Notation Working Group: GSN Community Standard v1, November 2011"},{"key":"24_CR5","unstructured":"Kelly, T., Bates, S.: The costs, benefits, and risks associated with pattern-based and modular safety case development. In: Proceedings UK MoD Equipment Safety Assurance Symposium, October 2005"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-40793-2_3","volume-title":"Computer Safety, Reliability, and Security","author":"E Denney","year":"2013","unstructured":"Denney, E., Pai, G.: A formal basis for safety case patterns. In: Bitsch, F., Guiochet, J., Ka\u00e2niche, M. (eds.) SAFECOMP. LNCS, vol. 8153, pp. 21\u201332. Springer, Heidelberg (2013)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/978-3-319-10506-2_20","volume-title":"Computer Safety, Reliability, and Security","author":"E Denney","year":"2014","unstructured":"Denney, E., Naylor, D., Pai, G.: Querying safety cases. In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 294\u2013309. Springer, Heidelberg (2014)"},{"key":"24_CR8","unstructured":"Object Management Group: Structured Assurance Case Metamodel (SACM) version 1.0. Formal\/2013-02-01, February 2013"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-642-33675-1_2","volume-title":"Computer Safety, Reliability, and Security","author":"E Denney","year":"2012","unstructured":"Denney, E., Pai, G., Pohl, J.: AdvoCATE: an assurance case automation toolset. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP Workshops 2012. LNCS, vol. 7613, pp. 8\u201321. Springer, Heidelberg (2012)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Fenn, J., Hawkins, R., Williams, P., Kelly, T.: Safety case composition using contracts - refinements based on feedback from an industrial case study. In: Proceedings of the 15th Safety Critical Systems Symposium (SSS 2007), February 2007","DOI":"10.1007\/978-1-84628-806-7_9"},{"key":"24_CR11","unstructured":"Industrial Avionics Working Group: Modular Software Safety Case Process GSN - MSSC 203 Issue 1, November 2012"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Denney, E., Pai, G., Whiteside, I.: Formal foundations for hierarchical safety cases. In: Proceedings of the 16th International Symposium on High Assurance System Engineering (HASE 2015), January 2015","DOI":"10.1109\/HASE.2015.17"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Warg, F., Vedder, B., Skoglund, M., S\u00f6derberg, A.: SafetyADD: a tool for safety-contract based design. In: Proceedings of the 25th International Symposium on Software Reliability Engineering Workshops (ISSREW 2014) (2014)","DOI":"10.1109\/ISSREW.2014.18"},{"key":"24_CR14","unstructured":"Kelly, T.: Concepts and principles of compositional safety case construction. In: Technical report COMSA\/2001\/1\/1, University of York (2001)"},{"key":"24_CR15","unstructured":"Industrial Avionics Working Group: Modular Software Safety Case Process Description - MSSC 201 Issue 1, November 2012"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Matsuno, Y.: A design and implementation of an assurance case language. In: 44th International Conference on Dependable Systems and Networks (DSN 2014), pp. 630\u2013641, June 2014","DOI":"10.1109\/DSN.2014.97"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24255-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:45:12Z","timestamp":1559238312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24255-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242545","9783319242552"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24255-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}