{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T15:57:07Z","timestamp":1762444627260,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319454795"},{"type":"electronic","value":"9783319454801"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45480-1_27","type":"book-chapter","created":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T15:08:20Z","timestamp":1472828900000},"page":"334-345","source":"Crossref","is-referenced-by-count":21,"title":["Goal-Oriented Co-Engineering of Security and Safety Requirements in Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Ponsard","sequence":"first","affiliation":[]},{"given":"Gautier","family":"Dallons","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Massonet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,1]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Ben Othmane, L., Al-Fuqaha, A., Ben Hamida, E., Van Den Brand, M.: Towards extended safety in connected vehicles. In: 2013 16th International IEEE Conference on Intelligent Transportation Systems-(ITSC), pp. 652\u2013657. IEEE (2013)","DOI":"10.1109\/ITSC.2013.6728305"},{"key":"27_CR2","unstructured":"Cartwright, R., Cheng, A., Hudak, P., OMalley, M., Taha, W.: Cyber-physical challenges in transportation system design. In: National Workshop for Research on High Confidence Transportation Cyber-Physical Systems (2008)"},{"key":"27_CR3","unstructured":"CENELEC: EN 50128:2001, Railway applications - Communications, signalling and processing systems - Software for railway control and protection systems. Technical report (2001)"},{"key":"27_CR4","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 6. USENIX Association, Berkeley (2011)"},{"key":"27_CR5","series-title":"SpringerBriefs in Computer Science","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/978-1-4614-9357-0_2","volume-title":"Security Assessment in Vehicular Networks","author":"S Du","year":"2013","unstructured":"Du, S., Zhu, H.: Security assessment via attack tree model. In: Du, S., Zhu, H. (eds.) Security Assessment in Vehicular Networks. SpringerBriefs in Computer Science, pp. 9\u201316. Springer, New York (2013)"},{"issue":"1","key":"27_CR6","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s00766-009-0092-x","volume":"15","author":"B Fabian","year":"2010","unstructured":"Fabian, B., G\u00fcrses, S., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requirements Eng. 15(1), 7\u201340 (2010)","journal-title":"Requirements Eng."},{"key":"27_CR7","unstructured":"International Standardization Organization: ISO 26262: Road vehicles - functional safety. ISO (2011)"},{"key":"27_CR8","unstructured":"ITEA: MERGE Project. http:\/\/www.merge-project.eu"},{"key":"27_CR9","unstructured":"Kotenko, I., Chechulin, A.: A cyber attack modeling and impact assessment framework. In: 2013 5th International Conference on Cyber Conflict (CyCon), pp. 1\u201324. IEEE (2013)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A.: Goal-oriented requirements engineering: a guided tour. In: Fifth IEEE International Symposium on Requirements Engineering, pp. 249\u2013262 (2001)","DOI":"10.1109\/ISRE.2001.948567"},{"key":"27_CR11","volume-title":"Requirements Engineering - From System Goals to UML Models to Software Specifications","author":"A Lamsweerde van","year":"2009","unstructured":"van Lamsweerde, A.: Requirements Engineering - From System Goals to UML Models to Software Specifications. Wiley, Chichester (2009)"},{"issue":"10","key":"27_CR12","doi-asserted-by":"crossref","first-page":"978","DOI":"10.1109\/32.879820","volume":"26","author":"A Lamsweerde van","year":"2000","unstructured":"van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Softw. Eng. 26(10), 978\u20131005 (2000)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"27_CR13","unstructured":"Lamsweerde, A.V., Brohez, S., Landtsheer, R.D., Janssens, D.: From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering. In: Proceedings of the RHAS 2003, pp. 49\u201356 (2003)"},{"issue":"3","key":"27_CR14","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/s10515-007-0013-5","volume":"14","author":"F Massacci","year":"2007","unstructured":"Massacci, F., Mylopoulos, J., Zannone, N.: Computer-aided support for secure tropos. Autom. Softw. Eng. 14(3), 341\u2013364 (2007)","journal-title":"Autom. Softw. Eng."},{"key":"27_CR15","unstructured":"MERGE Project: Recommandations for Security and Safety Co-engineering. Delivrable (2016)"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Moore, A.P., Ellison, R.J., Linger, R.C.: Attack modeling for information security and survivability. Technical report, DTIC Document (2001)","DOI":"10.21236\/ADA387544"},{"key":"27_CR17","unstructured":"OECD: Digital Security Risk Management for Economic and Social Prosperity - OECD Recommendation and Companion Document (2015). http:\/\/www.oecd.org\/sti\/ieconomy\/digital-security-risk-management.htm"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Paul, S.: On the meaning of security for safety (s4s). In: Safety and Security Engineering VI, vol. 151, p. 379 (2015)","DOI":"10.2495\/SAFE150321"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Paul, S., Rioux, L.: Over 20 years of research in cybersecurity and safety engineering: a short bibliography. In: Conference: 6th International Conference on Safety and Security Engineering (SAFE), May 2015","DOI":"10.2495\/SAFE150291"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Rajkumar, R., Lee, I., Sha, L., Stankovic, J.: Cyber-physical systems: the next computing revolution. In: 2010 47th ACM\/IEEE Design Automation Conference (DAC), pp. 731\u2013736, June 2010","DOI":"10.1145\/1837274.1837461"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Rashid, A., Naqvi, S.A.A., Ramdhany, R., Edwards, M., Chitchyan, R., Babar, M.A.: Discovering unknown known security requirements. In: Proceedings of the 38th International Conference on Software Engineering, pp. 866\u2013876. ACM (2016)","DOI":"10.1145\/2884781.2884785"},{"key":"27_CR22","unstructured":"Respect-IT: Objectiver. http:\/\/www.objectiver.com"},{"key":"27_CR23","unstructured":"SAE: Recommended Practice J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems. http:\/\/articles.sae.org\/14503"},{"key":"27_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-319-24249-1_12","volume-title":"Computer Safety, Reliability, and Security","author":"C Schmittner","year":"2015","unstructured":"Schmittner, C., Ma, Z.: Towards a framework for alignment between automotive safety and security standards. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 133\u2013143. Springer, Heidelberg (2015)"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Schmittner, C., Ma, Z., Schoitsch, E., Gruber, T.: A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, pp. 69\u201380. ACM (2015)","DOI":"10.1145\/2732198.2732204"},{"key":"27_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/978-3-319-10557-4_21","volume-title":"Computer Safety, Reliability, and Security","author":"D Schneider","year":"2014","unstructured":"Schneider, D., Armengaud, E., Schoitsch, E.: Towards trust assurance and certification in cyber-physical systems. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds.) SAFECOMP 2014. LNCS, vol. 8696, pp. 180\u2013191. Springer, Heidelberg (2014)"},{"key":"27_CR27","series-title":"Lecture Notes in Mobility","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-319-20855-8_20","volume-title":"Advanced Microsystems for Automotive Applications","author":"E Schoitsch","year":"2016","unstructured":"Schoitsch, E., Schmittner, C., Ma, Z., Gruber, T.: The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles. In: Schulze, T., M\u00fcller, B., Meyer, G. (eds.) Advanced Microsystems for Automotive Applications. Lecture Notes in Mobility, pp. 251\u2013261. Springer, Switzerland (2016)"},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Sha, L., Gopalakrishnan, S., Liu, X., Wang, Q.: Cyber-physical systems: a new frontier. In: Machine Learning in Cyber Trust, pp. 3\u201313. Springer (2009)","DOI":"10.1007\/978-0-387-88735-7_1"},{"key":"27_CR29","unstructured":"Ottawa, U.: jUCMNav: Juice up your modelling (2001). https:\/\/www.openhub.net\/p\/jucmnav"},{"key":"27_CR30","unstructured":"Van Lamsweerde, A., et al.: Engineering requirements for system reliability and security. In: NATO Security Through Science Series D-Information and Communication Security, vol. 9, p. 196 (2007)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45480-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T16:22:09Z","timestamp":1749572529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45480-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319454795","9783319454801"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45480-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}