{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T04:10:52Z","timestamp":1749615052536,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319454795"},{"type":"electronic","value":"9783319454801"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45480-1_24","type":"book-chapter","created":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T15:08:20Z","timestamp":1472828900000},"page":"298-310","source":"Crossref","is-referenced-by-count":0,"title":["ASIL Tailoring on Functional Safety Requirements"],"prefix":"10.1007","author":[{"given":"Markus","family":"Fockel","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,1]]},"reference":[{"key":"24_CR1","unstructured":"Automotive Special Interest Group (SIG): Automotive SPICE: Process Reference Model, v4.5 (2010)"},{"issue":"1","key":"24_CR2","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MS.2013.118","volume":"31","author":"LS Azevedo","year":"2014","unstructured":"Azevedo, L.S., Parker, D., Walker, M., Papadopoulos, Y., Araujo, R.E.: Assisted assignment of automotive safety requirements. IEEE Softw. 31(1), 62\u201368 (2014)","journal-title":"IEEE Softw."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Berry, D.M.: The safety requirements engineering dilemma. In: Proceedings of the Ninth International Workshop on Software Specification and Design, pp. 147\u2013149, April 1998","DOI":"10.1109\/IWSSD.1998.667930"},{"key":"24_CR4","unstructured":"Brenner, C., Greenyer, J., Panzica La Manna, V.: The ScenarioTools play-out of modal sequence diagram specifications with environment assumptions. In: 12th International Workshop on Graph Transformation and Visual Modeling Techniques (2013)"},{"key":"24_CR5","unstructured":"EAST-ADL Association: EAST-ADL Domain Model Specification, v2.1.12 (2013)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Fockel, M., Holtmann, J.: A requirements engineering methodology combining models and controlled natural language. In: 4th International Model-Driven Requirements Engineering Workshop (MoDRE). IEEE, Karlskrona, August 2014","DOI":"10.1109\/MoDRE.2014.6890827"},{"key":"24_CR7","series-title":"Lecture Notes in Mechanical Engineering","volume-title":"Design Methodology for Intelligent Technical Systems","author":"J Gausemeier","year":"2014","unstructured":"Gausemeier, J., Rammig, F.J., Sch\u00e4fer, W.: Design Methodology for Intelligent Technical Systems. Lecture Notes in Mechanical Engineering. Springer, Heidelberg (2014)"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/978-3-540-30138-7_15","volume-title":"Computer Safety, Reliability, and Security","author":"H Giese","year":"2004","unstructured":"Giese, H., Tichy, M., Schilling, D.: Compositional hazard analysis of UML component and deployment models. In: Heisel, M., Liggesmeyer, P., Wittmann, S. (eds.) SAFECOMP 2004. LNCS, vol. 3219, pp. 166\u2013179. Springer, Heidelberg (2004)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Greenyer, J., Brenner, C., Cordy, M., Heymans, P., Gressi, E.: Incrementally synthesizing controllers from scenario-based product line specifications. In: 9th Joint Meeting of the ESEC\/FSE, pp. 433\u2013443. ACM, New York (2013)","DOI":"10.1145\/2491411.2491445"},{"issue":"2","key":"24_CR10","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10270-007-0054-z","volume":"7","author":"D Harel","year":"2008","unstructured":"Harel, D., Maoz, S.: Assert and negate revisited: modal semantics for UML sequence diagrams. Softw. Syst. Model. 7(2), 237\u2013252 (2008)","journal-title":"Softw. Syst. Model."},{"key":"24_CR11","unstructured":"Holtmann, J., Meyer, M.: Play-out for hierarchical component architectures. In: 11th Workshop Automotive Software Engineering. GI-Edition - Lecture Notes in Informatics (LNI), vol. P-220. Bonner K\u00f6llen Verlag (2013)"},{"key":"24_CR12","unstructured":"INCOSE: Systems engineering handbook: A guide for system lifecycle processes and activities (version 3.2.2) (2011)"},{"key":"24_CR13","unstructured":"ISO: ISO 26262:2011(E): Road vehicles - Functional safety (2011)"},{"key":"24_CR14","unstructured":"Kaiser, B., Liggesmeyer, P., M\u00e4ckel, O.: A new component concept for fault trees. In: 8th Australian Workshop on Safety Critical Systems and Software (2003)"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Mader, R., Armengaud, E., Leitner, A., Steger, C.: Automatic and optimal allocation of safety integrity levels. In: Proceedings of the Annual Reliability and Maintainability Symposium, RAMS 2012, pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/RAMS.2012.6175431"},{"key":"24_CR16","unstructured":"OMG: OMG Systems Modeling Language (OMG SysML) (2012)"},{"volume-title":"Model-Based Engineering of Embedded Systems: The SPES 2020 Methodology","year":"2012","key":"24_CR17","unstructured":"Pohl, K., H\u00f6nninger, H., Achatz, R., Broy, M. (eds.): Model-Based Engineering of Embedded Systems: The SPES 2020 Methodology. Springer, Heidelberg (2012)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Ward, D.D., Crozier, S.E.: The uses and abuses of ASIL decomposition in ISO 26262. In: 7th IET International Conference on System Safety, Incorporating the Cyber Security Conference 2012, pp. 1\u20136, October 2012","DOI":"10.1049\/cp.2012.1523"},{"volume-title":"Handbook of Driver Assistance Systems","year":"2016","key":"24_CR19","unstructured":"Winner, H., Hakuli, S., Lotz, F., Singer, C. (eds.): Handbook of Driver Assistance Systems. Springer, Cham (2016)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45480-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T16:21:31Z","timestamp":1749572491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45480-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319454795","9783319454801"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45480-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}