{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:53:34Z","timestamp":1776441214948,"version":"3.51.2"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319594149","type":"print"},{"value":"9783319594156","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59415-6_39","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T08:42:30Z","timestamp":1496133750000},"page":"407-417","source":"Crossref","is-referenced-by-count":10,"title":["Assurance Case Patterns On-line Catalogue"],"prefix":"10.1007","author":[{"given":"Monika","family":"Szczygielska","sequence":"first","affiliation":[]},{"given":"Aleksander","family":"Jarz\u0119bowicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"Kissel, R.: Glossary of key information security terms. Revision 2, NIST IR 7298. National Institute of Standards and Technology (2013)","DOI":"10.6028\/NIST.IR.7298r2"},{"key":"39_CR2","unstructured":"International Organization for Standardization (ISO): ISO\/DIS 26262: Road Vehicles - Functional Safety (2011)"},{"key":"39_CR3","unstructured":"CENELEC: EN 50126. Railway Applications: The Specification and Demonstration of Reliability, Availability, Maintainability and Safety (RAMS) (1999)"},{"key":"39_CR4","unstructured":"FDA: Infusion Pumps Total Product Life Cycle, Guidance for Industry and FDA staff (2014)"},{"key":"39_CR5","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1995)"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Kelly, T.: Arguing safety \u2013 a systematic approach to safety case management. Ph.D. thesis, Department of Computer Science, University of York (1998)","DOI":"10.1007\/3-540-48249-0_2"},{"key":"39_CR7","volume-title":"Safety Cases and Safety Reports: Meaning, Motivation and Management","author":"R Maguire","year":"2006","unstructured":"Maguire, R.: Safety Cases and Safety Reports: Meaning, Motivation and Management. Ashgate Publishing Ltd, Aldershot (2006)"},{"key":"39_CR8","unstructured":"Despotou, G., Kelly, T.: Extending the safety case concept to address dependability. In: Proceedings of 22nd International System Safety Conference, pp. 645\u2013654 (2004)"},{"key":"39_CR9","unstructured":"International Organization for Standardization (ISO): 15026-2:2011: Systems and Software Engineering \u2013 Systems and Software Assurance \u2013 Part 2: Assurance Case (2011)"},{"key":"39_CR10","unstructured":"Object Management Group: Structured Assurance Case Metamodel ver. 1.1 (2015)"},{"key":"39_CR11","unstructured":"Adelard: Claims, Arguments and Evidence (CAE). http:\/\/www.adelard.com\/asce\/choosing-asce\/cae.html"},{"key":"39_CR12","unstructured":"GSN Community Standard Working Group: GSN community standard version 1 (2011). http:\/\/www.goalstructuringnotation.info\/"},{"key":"39_CR13","unstructured":"Argevide: NOR-STA Argument Notation White Paper. https:\/\/www.argevide.com\/sites\/default\/files\/docs\/Argevide%20WP2%20-%20NOR-STA%20argument%20notation.pdf"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"G\u00f3rski, J., Jarz\u0119bowicz, A., Leszczyna, R., Miler, J., Olszewski, M.: An approach to trust case development. In: Proceedings of the 22nd International Conference on Computer Safety, Reliability and Security (SAFECOMP 2003). LNCS, vol. 2788, pp. 193\u2013206 (2003)","DOI":"10.1007\/978-3-540-39878-3_16"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Kelly, T., McDermid, J.: Safety case construction and reuse using patterns. In: Proceedings of SAFECOMP 1997, pp. 55\u201369 (1997)","DOI":"10.1007\/978-1-4471-0997-6_5"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Hawkins, R., Clegg, K., Alexander, R., Kelly, T.: Using a software safety argument pattern catalogue - two case studies. In: Proceedings of the 30th International Conference on Computer Safety, Reliability and Security (SAFECOMP 2011). LNCS, vol. 6894, pp. 185\u2013198 (2011)","DOI":"10.1007\/978-3-642-24270-0_14"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Khalil, M., Sch\u00e4tz, B., Voss, S.: A Pattern-based approach towards modular safety analysis and argumentation. In: Proceedings of ERTS 2014, Toulouse, France. LNCS, vol. 8822, pp. 137\u2013151 (2014)","DOI":"10.1007\/978-3-319-12214-4_11"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Hauge, A., St\u00f8len, K.: A pattern-based method for safe control systems exemplified within nuclear power production. In: Proceedings of the 31st International Conference on Computer Safety, Reliability and Security (SAFECOMP 2012). LNCS, vol. 7612, pp. 13\u201324 (2012)","DOI":"10.1007\/978-3-642-33678-2_2"},{"key":"39_CR19","unstructured":"Ye, F.: Justifying the use of COTS components within safety critical applications. Ph.D. thesis, Department of Computer Science, University of York (2005)"},{"key":"39_CR20","doi-asserted-by":"crossref","unstructured":"Ayoub, A., Kim, B., Lee, I., Sokolsky, O.: A safety case pattern for model-based development approach. In: Proceedings of the 4th NASA Formal Methods Symposium (NFM 2012). LNCS, vol. 7226, pp. 141\u2013146 (2012)","DOI":"10.1007\/978-3-642-28891-3_14"},{"key":"39_CR21","unstructured":"Denney, E., Pai, G.: Safety case patterns: theory and applications. NASA\/TM\u20132015\u2013218492 Technical report (2015)"},{"key":"39_CR22","unstructured":"Alexander, R., Kelly, T., Kurd, Z., McDermid, J.: Safety cases for advanced control software: safety case patterns. Technical report, University of York (2007)"},{"key":"39_CR23","doi-asserted-by":"crossref","unstructured":"Yamamoto, S., Matsuno, Y.: An evaluation of argument patterns to reduce pitfalls of applying assurance case. In: Proceedings of 1st International Workshop on Assurance Cases for Software-Intensive Systems (ASSURE 2013), pp. 12\u201317 (2013)","DOI":"10.1109\/ASSURE.2013.6614265"},{"key":"39_CR24","unstructured":"Weaver, R.: The safety of software \u2013 constructing and assuring arguments. Ph.D. thesis, Department of Computer Science, University of York (2003)"},{"key":"39_CR25","unstructured":"Hawkins, R., Kelly, T.: A software safety argument pattern catalogue. Technical report, University of York (2013)"},{"key":"39_CR26","unstructured":"Weinstock, C., Lipson, H., Goodenough, J.: Arguing security - creating security assurance cases. US CERT BSI (Build Security In) report, Carnegie Mellon University (2007)"},{"key":"39_CR27","unstructured":"Assurance Case Patterns On-line Catalogue, Gda\u0144sk University of Technology. http:\/\/www.nor-sta.eu\/en\/en\/news\/assurance_case_pattern_catalogue"},{"key":"39_CR28","doi-asserted-by":"crossref","unstructured":"Larson, B.R., Hatcliff, J., Chalin, P.: Open source patient-controlled analgesic pump requirements documentation. In: 5th International Workshop on Software Engineering in Health Care (SEHC), pp. 28\u201334 (2013)","DOI":"10.1109\/SEHC.2013.6602474"},{"key":"39_CR29","unstructured":"Larson, B.R.: Open PCA Pump Assurance Case, Santos Research Group, Kansas State University (2014). http:\/\/openpcapump.santoslab.org\/"},{"key":"39_CR30","doi-asserted-by":"crossref","unstructured":"Wardzi\u0144ski, A., Jarz\u0119bowicz, A.: Towards safety case integration with hazard analysis for medical devices. In: Proceedings of 4th International Workshop on Assurance Cases for Software-intensive Systems (ASSURE 2016). LNCS, vol. 9923, pp. 87\u201398 (2016)","DOI":"10.1007\/978-3-319-45480-1_8"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Dependability Engineering of Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59415-6_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T23:21:24Z","timestamp":1659050484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59415-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"ISBN":["9783319594149","9783319594156"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59415-6_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,31]]}}}