{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T12:18:16Z","timestamp":1725884296515},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319509525"},{"type":"electronic","value":"9783319509532"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50953-2_23","type":"book-chapter","created":{"date-parts":[[2017,4,11]],"date-time":"2017-04-11T10:07:32Z","timestamp":1491905252000},"page":"331-347","source":"Crossref","is-referenced-by-count":0,"title":["On the Interpretation of Assurance Case Arguments"],"prefix":"10.1007","author":[{"given":"John","family":"Rushby","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,12]]},"reference":[{"key":"23_CR1","unstructured":"RTCA, Washington, DC: DO-178C: Software Considerations in Airborne Systems and Equipment Certification (2011)"},{"key":"23_CR2","unstructured":"Society of Automotive Engineers: Aerospace Recommended Practice (ARP) 4754A: Certification Considerations for Highly-Integrated or Complex Aircraft Systems. Also issued as EUROCAE ED-79 (2010)"},{"key":"23_CR3","unstructured":"Society of Automotive Engineers: Aerospace Recommended Practice (ARP) 4761: Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment (1996)"},{"key":"23_CR4","unstructured":"Holloway, C.M.: Explicate \u201978: discovering the implicit assurance case in DO-178C. In: Parsons, M., Anderson, T. (eds.) Engineering Systems for Safety. Proceedings of 23rd Safety-critical Systems Symposium, Bristol, UK, pp. 205\u2013225 (2015)"},{"key":"23_CR5","unstructured":"Rushby, J., Xu, X., Rangarajan, M., Weaver, T.L.: Understanding and evaluating assurance cases. NASA Contractor Report NASA\/CR-2015-218802, NASA Langley Research Center (2015)"},{"key":"23_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511840005","volume-title":"The Uses of Argument","author":"SE Toulmin","year":"2003","unstructured":"Toulmin, S.E.: The Uses of Argument. Cambridge University Press, Cambridge (2003). Updated edition (the original is dated 1958)"},{"key":"23_CR7","unstructured":"Adams, E.W.: A Primer of Probability Logic. Center for the Study of Language and Information (CSLI), Stanford University (1998)"},{"key":"23_CR8","volume-title":"Probability and the Weighing of Evidence","author":"IJ Good","year":"1950","unstructured":"Good, I.J.: Probability and the Weighing of Evidence. Charles Griffin, London (1950)"},{"key":"23_CR9","unstructured":"Good, I.J.: Weight of evidence: a brief survey. In: Bernardo, J., et al. (eds.) Bayesian Statistics 2: Proceedings of the Second Valencia International Meeting, Valencia, Spain, pp. 249\u2013270 (1983)"},{"key":"23_CR10","volume-title":"Bayesian Epistemology","author":"L Bovens","year":"2003","unstructured":"Bovens, L., Hartmann, S.: Bayesian Epistemology. Oxford University Press, Oxford (2003)"},{"key":"23_CR11","volume-title":"Bayes or Bust? A Critical Examination of Bayesian Confirmation Theory","author":"J Earman","year":"1992","unstructured":"Earman, J.: Bayes or Bust? A Critical Examination of Bayesian Confirmation Theory. MIT Press, Cambridge (1992)"},{"key":"23_CR12","unstructured":"Dawid, A.P.: Bayes\u2019s theorem and weighing evidence by juries. In: Swinburne, R. (ed.) Bayes\u2019s Theorem. Proceedings of the British Academy, pp. 71\u201390 (2002)"},{"key":"23_CR13","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511816161","volume-title":"Subjective Probability: The Real Thing","author":"R Jeffrey","year":"2004","unstructured":"Jeffrey, R.: Subjective Probability: The Real Thing. Cambridge University Press, Cambridge (2004)"},{"key":"23_CR14","unstructured":"Fitelson, B.: Studies in Bayesian Confirmation Theory. Ph.D. thesis, Department of Philosophy, University of Wisconsin, Madison (2001)"},{"key":"23_CR15","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.cognition.2005.09.006","volume":"103","author":"K Tentori","year":"2007","unstructured":"Tentori, K., Crupi, V., Bonini, N., Osherson, D.: Comparison of confirmation measures. Cognition 103, 107\u2013119 (2007)","journal-title":"Cognition"},{"key":"23_CR16","unstructured":"Joyce, J.M.: On the plurality of probabilist measures of evidential relevance. In: Bayesian Epistemology Workshop of the 26th International Wittgenstein Symposium, Kirchberg, Austria (2003)"},{"key":"23_CR17","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1111\/j.1740-9713.2005.00076.x","volume":"2","author":"T Gardner-Medwin","year":"2005","unstructured":"Gardner-Medwin, T.: What probability should a jury address? Significance 2, 9\u201312 (2005)","journal-title":"Significance"},{"key":"23_CR18","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TSE.2007.1002","volume":"33","author":"B Littlewood","year":"2007","unstructured":"Littlewood, B., Wright, D.: The use of multi-legged arguments to increase confidence in safety claims for software-based systems: a study based on a BBN analysis of an idealised example. IEEE Trans. Softw. Eng. 33, 347\u2013365 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"23_CR19","unstructured":"HUGIN Expert: Hugin home page. http:\/\/www.hugin.com\/ . Accessed 2015"},{"key":"23_CR20","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-0-85729-133-2_1","volume-title":"Advances in System Safety: Proceedings of 19th Safety-Critical Systems Symposium","author":"R Hawkins","year":"2011","unstructured":"Hawkins, R., Kelly, T., Knight, J., Graydon, P.: A new approach to creating clear safety arguments. In: Dale, C., Anderson, T. (eds.) Advances in System Safety: Proceedings of 19th Safety-Critical Systems Symposium, pp. 3\u201323. Springer, London (2011)"},{"key":"23_CR21","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/BF00166441","volume":"28","author":"CG Hempel","year":"1988","unstructured":"Hempel, C.G.: Provisoes: a problem concerning the inferential function of scientific theories. Erkenntnis 28, 147\u2013164 (1988)","journal-title":"Erkenntnis"},{"key":"23_CR22","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1093\/oso\/9780195121377.003.0018","volume-title":"Science, Explanation, and Rationality: Aspects of the Philosophy of Carl G. Hempel","author":"F Suppe","year":"2000","unstructured":"Suppe, F.: Hempel and the problem of provisos. In: Fetzer, J.H. (ed.) Science, Explanation, and Rationality: Aspects of the Philosophy of Carl G. Hempel, pp. 186\u2013213. Oxford University Press, Oxford (2000)"},{"key":"23_CR23","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1023\/A:1021526110200","volume":"57","author":"J Earman","year":"2002","unstructured":"Earman, J., Roberts, J., Smith, S.: Ceteris paribus lost. Erkenntnis 57, 281\u2013301 (2002)","journal-title":"Erkenntnis"},{"key":"23_CR24","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/32.713327","volume":"24","author":"J Rushby","year":"1998","unstructured":"Rushby, J., Owre, S., Shankar, N.: Subtypes for specifications: predicate subtyping in PVS. IEEE Trans. Softw. Eng. 24, 709\u2013720 (1998)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"23_CR25","first-page":"184","volume":"47","author":"F Zeng","year":"2013","unstructured":"Zeng, F., Lu, M., Zhong, D.: Using D-S evidence theory to evaluation of confidence in safety case. J. Theor. Appl. Inform. Technol. 47, 184\u2013189 (2013)","journal-title":"J. Theor. Appl. Inform. Technol."},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Denney, E., Pai, G., Habli, I.: Towards measurement of confidence in safety cases. In: Fifth International Symposium on Empirical Software Engineering and Measurement (ESEM), Banff, Canada, pp. 380\u2013383. IEEE Computer Society (2011)","DOI":"10.1109\/ESEM.2011.53"},{"key":"23_CR27","series-title":"Law, Governance and Technology Series","volume-title":"Agreement Technologies","year":"2013","unstructured":"Ossowski, S. (ed.): Agreement Technologies. Law, Governance and Technology Series, vol. 8. Springer, Heidelberg (2013)"},{"key":"23_CR28","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"CB Haley","year":"2008","unstructured":"Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34, 133\u2013153 (2008)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","New Frontiers in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50953-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T14:31:45Z","timestamp":1719153105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50953-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319509525","9783319509532"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50953-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}