{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T17:47:29Z","timestamp":1743875249640,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319259413"},{"type":"electronic","value":"9783319259420"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25942-0_13","type":"book-chapter","created":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T05:32:14Z","timestamp":1444973534000},"page":"201-216","source":"Crossref","is-referenced-by-count":3,"title":["From Requirements Engineering to Safety Assurance: Refinement Approach"],"prefix":"10.1007","author":[{"given":"Linas","family":"Laibinis","sequence":"first","affiliation":[]},{"given":"Elena","family":"Troubitsyna","sequence":"additional","affiliation":[]},{"given":"Yuliya","family":"Prokhorova","sequence":"additional","affiliation":[]},{"given":"Alexei","family":"Iliasov","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Romanovsky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Abrial, J.R.: Modeling in Event B. Cambridge University Press (2010)","DOI":"10.1017\/CBO9781139195881"},{"key":"13_CR2","unstructured":"(EU-project DEPLOY). \n                      http:\/\/www.deploy-project.eu\/"},{"volume-title":"Industrial Deployment of System Engineering Methods","year":"2013","key":"13_CR3","unstructured":"Romanovsky, A., Thomas, M. (eds.): Industrial Deployment of System Engineering Methods. Springer, Heidelberg (2013)"},{"key":"13_CR4","unstructured":"(EU-project RODIN). \n                      http:\/\/rodin.cs.ncl.ac.uk\/"},{"key":"13_CR5","unstructured":"OSLC: (Open Services for Lifecycle Collaboration.). \n                      http:\/\/open-services.net\/"},{"key":"13_CR6","unstructured":"RODIN: Event-B Platform (2009). \n                      http:\/\/www.event-b.org\/"},{"key":"13_CR7","unstructured":"(EU-project ADVANCE). \n                      http:\/\/www.advance-ict.eu"},{"key":"13_CR8","unstructured":"Prokhorova, Y., Laibinis, L., Troubitsyna, E.: Towards rigorous construction of safety cases. Technical Report 1110 (2014)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Bishop, P., Bloomfield, R.: A methodology for safety case development. In: Safety-Critical Systems Symposium, Birmingham, UK. Springer (1998)","DOI":"10.1007\/978-1-4471-1534-2_14"},{"key":"13_CR10","unstructured":"International Organization for Standardization: ISO 26262 Road Vehicles Functional Safety (2011)"},{"key":"13_CR11","unstructured":"European Committee for Electrotechnical Standardization: EN 50126 Railway applications - The Specification and Demonstration of Reliability. Availability, Maintainability and Safety (RAMS) (2011)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Kelly, T., McDermid, J.: Safety case construction and reuse using patterns. In: Daniel, P. (ed.) Proceedings of the 16th International Conference on Computer Safety, Reliability and Security (SAFECOMP 1997), pp. 55\u201369. Springer (1997)","DOI":"10.1007\/978-1-4471-0997-6_5"},{"key":"13_CR13","unstructured":"Goal Structuring Notation Working Group: Goal Structuring Notation Standard (2011). \n                      http:\/\/www.goalstructuringnotation.info\/"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.infsof.2015.01.001","volume":"60","author":"Y Prokhorova","year":"2015","unstructured":"Prokhorova, Y., Laibinis, L., Troubitsyna, E.: Facilitating construction of safety cases from formal models in Event-B. Information and Software Technology 60, 51\u201376 (2015)","journal-title":"Information and Software Technology"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Abrial, J.R.: Steam-Boiler control specification problem. In: Formal Methods for Industrial Applications, Specifying and Programming the Steam Boiler Control, London, UK, pp. 500\u2013509. Springer (1996)","DOI":"10.1007\/BFb0027252"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Prokhorova, Y., Troubitsyna, E., Laibinis, L.: A Case Study in Refinement-Based Modelling of a Resilient Control System. TUCS Technical Report 1086 (2013)","DOI":"10.1007\/978-3-642-40894-6_7"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-24124-6_2","volume-title":"Software Engineering for Resilient Systems","author":"A Iliasov","year":"2011","unstructured":"Iliasov, A.: Use case scenarios as verification conditions: event-B\/Flow approach. In: Troubitsyna, E.A. (ed.) SERENE 2011. LNCS, vol. 6968, pp. 9\u201323. Springer, Heidelberg (2011)"},{"key":"13_CR18","unstructured":"Wooldridge, M.: An Introduction to MultiAgent Systems. Wiley Publishing (2009)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/11818502_10","volume-title":"Advanced Topics in Exception Handling Techniques","author":"A Iliasov","year":"2006","unstructured":"Iliasov, A., Romanovsky, A.: Structured coordination spaces for fault tolerant mobile agents. In: Cheraghchi, H.S., Lindskov Knudsen, J., Romanovsky, A., Babu, C.S. (eds.) Advanced Topics in Exception Handling Techniques. LNCS, vol. 4119, pp. 181\u2013199. Springer, Heidelberg (2006)"},{"issue":"1","key":"13_CR20","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2363.2433","volume":"7","author":"D Gelernter","year":"1985","unstructured":"Gelernter, D.: Generative communication in linda. ACM Transactions on Programming Languages and Systems 7(1), 80\u2013112 (1985)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"13_CR21","unstructured":"Rodin OSLC Adapter: (Using Instructions). \n                      http:\/\/iliasov.org\/oslc\/"},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-1-84996-086-1_1","volume-title":"Making Systems Safer: Proceedings of the Eighteenth Safety-Critical Systems Symposium","author":"J Rushby","year":"2010","unstructured":"Rushby, J.: Formalism in safety cases. In: Dale, C., Anderson, T. (eds.) Making Systems Safer: Proceedings of the Eighteenth Safety-Critical Systems Symposium, pp. 3\u201317. Springer, Bristol (2010)"},{"key":"13_CR23","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.ssci.2013.04.007","volume":"59","author":"R Hawkins","year":"2013","unstructured":"Hawkins, R., Habli, I., Kelly, T., McDermid, J.: Assurance cases and prescriptive software safety certification: a comparative study. Safety Science 59, 55\u201371 (2013)","journal-title":"Safety Science"},{"key":"13_CR24","unstructured":"Denney, E., Pai, G., Pohl, J.: Automating the Generation of Heterogeneous Aviation Safety Cases. NASA Contractor Report NASA\/CR-2011-215983 (2011)"},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-642-16561-0_33","volume-title":"Leveraging Applications of Formal Methods, Verification, and Validation","author":"E Jee","year":"2010","unstructured":"Jee, E., Lee, I., Sokolsky, O.: Assurance cases in model-driven development of the pacemaker software. In: Margaria, T., Steffen, B. (eds.) ISoLA 2010, Part II. LNCS, vol. 6416, pp. 343\u2013356. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering: Theories, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25942-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T03:13:10Z","timestamp":1559272390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25942-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319259413","9783319259420"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25942-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}