{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:47:33Z","timestamp":1773330453638,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319631936","type":"print"},{"value":"9783319631943","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63194-3_5","type":"book-chapter","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T11:58:43Z","timestamp":1501070323000},"page":"64-80","source":"Crossref","is-referenced-by-count":12,"title":["Reasoning About Confidence and Uncertainty in Assurance Cases: A Survey"],"prefix":"10.1007","author":[{"given":"Lian","family":"Duan","sequence":"first","affiliation":[]},{"given":"Sanjai","family":"Rayadurgam","sequence":"additional","affiliation":[]},{"given":"Mats P. E.","family":"Heimdahl","sequence":"additional","affiliation":[]},{"given":"Anaheed","family":"Ayoub","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Sokolsky","sequence":"additional","affiliation":[]},{"given":"Insup","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"key":"5_CR1","unstructured":"Ayoub, A., Chang, J., Sokolsky, O., Lee, I.: Assessing the overall sufficiency of safety arguments. In: Safety-Critical Systems Club (2013)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-33678-2_26","volume-title":"Computer Safety, Reliability, and Security","author":"A Ayoub","year":"2012","unstructured":"Ayoub, A., Kim, B.G., Lee, I., Sokolsky, O.: A systematic approach to justifying sufficient confidence in software safety arguments. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol. 7612, pp. 305\u2013316. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33678-2_26"},{"key":"5_CR3","unstructured":"Bender, M., Maibaum, T., Lawford, M., Wassyng, A.: Positioning verification in the context of software\/system certification. In: Proceedings of the 11th International Workshop on Automated Verification of Critical Systems (2011)"},{"issue":"3","key":"5_CR4","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1002\/(SICI)1099-1689(1998090)8:3<155::AID-STVR163>3.0.CO;2-B","volume":"8","author":"A Bertolino","year":"1998","unstructured":"Bertolino, A., Strigini, L.: Assessing the risk due to software faults: estimates of failure rate versus evidence of perfection. Softw. Testing Verification Reliab. 8(3), 155\u2013166 (1998)","journal-title":"Softw. Testing Verification Reliab."},{"issue":"5","key":"5_CR5","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1109\/TSE.2010.67","volume":"37","author":"P Bishop","year":"2011","unstructured":"Bishop, P., Bloomfield, R., Littlewood, B., Povyakalo, A., Wright, D.: Towards a formalism for conservative claims about the dependability of software-based systems. IEEE Trans. Softw. Eng. 37(5), 708\u2013717 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Bishop, P.: Safety and assurance cases: past, present, and possible future - an adelard perspective. In: Making Systems Safe (2010)","DOI":"10.1007\/978-1-84996-086-1_4"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Bloomfield, R.E., Littlewood, B., Wright, D.: Confidence: its role in dependability cases for risk assessment. In: International Conference on Dependable Systems and Networks (2007)","DOI":"10.1109\/DSN.2007.29"},{"key":"5_CR8","unstructured":"Chapman, R.: Safety assurance for embedded software in infusion pumps. In: Presented as a Keynote Talk at FHIES\/SEHC (2014)"},{"key":"5_CR9","unstructured":"Cyra, L., G $$\\acute{o}$$ o \u00b4 rski, J.: Supporting expert assessment of argument structures in trust cases. In: 9th International Probability Safety Assessment and Management Conference PSAM (2008)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Denney, E., Pai, G., Habli, I.: Towards measurement of confidence in safety cases. In: 2011 International Symposium on Empirical Software Engineering and Measurement (2011)","DOI":"10.1109\/ESEM.2011.53"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Goodenough, J.B., Weinstock, C.B., Klein, A.Z.: Toward a theory of assurance case confidence. Technical report, Carnegie Mellon (2012)","DOI":"10.21236\/ADA609836"},{"key":"5_CR12","unstructured":"Greenwell, W.S., Knight, J.C., Holloway, C.M., Pease, J.J.: A taxonomy of fallacies in system safety arguments. In: International System Safety Conference (2006)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Grigorova, S., Maibaum, T.S.E.: Taking a page from the law books: considering evidence weight in evaluating assurance case confidence. In: Software Reliability Engineering Workshops (2013)","DOI":"10.1109\/ISSREW.2013.6688926"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Hawkins, R.D., Kelly, T., Knight, J., Graydon, P.: A new approach to creating clear safety arguments. In: Advances in Systems Safety (2011)","DOI":"10.1007\/978-0-85729-133-2_1"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Hawkins, R.D., Kelly, T.P.: Software safety assurance - what is sufficient? In: 4th IET International Conference on Systems Safety (2009)","DOI":"10.1049\/cp.2009.1542"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Grandison, T.: Conditional inference in subjective logic. In: Proceedings of the 6th International Conference on Information Fusion (2003)","DOI":"10.1109\/ICIF.2003.177484"},{"key":"5_CR17","unstructured":"Kelly, T.: Arguing safety-a systematic approach to safety case management. PhD thesis, The University of York (1998)"},{"key":"5_CR18","unstructured":"Kelly, T.: Reviewing assurance arguments - a step-by-step approach. In: Safety Management Requirements for Defence System (2007)"},{"issue":"2","key":"5_CR19","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.strusafe.2008.06.020","volume":"31","author":"A Kiureghian Der","year":"2008","unstructured":"Der Kiureghian, A., Ditlevsen, O.: Aleatory or epistemic? does it matter? J. Struct. Safety 31(2), 105\u2013112 (2008)","journal-title":"J. Struct. Safety"},{"key":"5_CR20","unstructured":"Knight, J.: Private e-mail communication (2014)"},{"key":"5_CR21","unstructured":"Leveson, N.: Cost-effective safety certification of software-intensive systems. In: Seventh Software Certification Consortium (2011)"},{"issue":"5","key":"5_CR22","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TSE.2007.1002","volume":"33","author":"B Littlewood","year":"2007","unstructured":"Littlewood, B., Wright, D.: The use of multilegged arguments of increase confdience in safety claims for software-based sytems: a study based on a BBN analysis of an idealized example. IEEE Trans. Software Eng. 33(5), 347\u2013365 (2007)","journal-title":"IEEE Trans. Software Eng."},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Rodes, B.D., Knight, J.C., Wasson, K.S.: A security metric based on security arguments. In: WETSoM 2014 (2014)","DOI":"10.1145\/2593868.2593880"},{"key":"5_CR24","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-1-84996-086-1_1","volume-title":"Making Systems Safer","author":"J Rushby","year":"2010","unstructured":"Rushby, J.: Formalism in safety cases. In: Dale, C., Anderson, T. (eds.) Making Systems Safer, pp. 3\u201317. Springer, London (2010)"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Rushby, J.: Logic and epistemology in safety cases. In: Proceedings of SafeComp, p. 32 (2013)","DOI":"10.1007\/978-3-642-40793-2_1"},{"key":"5_CR26","unstructured":"Strigini, L.: Engineering judgement in reliability and safety and its limits: what can we learn from research in psychology. Technical report, Centre for Software Reliability Technical report (1996)"},{"key":"5_CR27","unstructured":"Swiler, L.P., Paez, T.L., Mayes, R.L.: Epistemic uncertainty quantification tutorial. In: Proceedings of the IMAC-XXVII (2009)"},{"key":"5_CR28","volume-title":"The Uses of Argument","author":"S Toulmin","year":"1958","unstructured":"Toulmin, S.: The Uses of Argument. Cambridge University Press, Cambridge (1958)"},{"key":"5_CR29","unstructured":"Weaver, R., Fenn, J., Kelly, T.: A pragmatic approach to reasoning about the assurance of safety arguments. In: 8th Australian Workshop on Safety Critical Systems and Software (SCS 2003) (2003)"},{"key":"5_CR30","unstructured":"Wilkinson, P.: The use of safety cases in certification and regulation by Nancy Leveson a review by Peter Wilkinson. Technical report, US Chemical Safety Board (2014)"},{"key":"5_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-33675-1_7","volume-title":"Computer Safety, Reliability, and Security","author":"X Zhao","year":"2012","unstructured":"Zhao, X., Zhang, D., Lu, M., Zeng, F.: A new approach to assessment of confidence in assurance cases. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol. 7613, pp. 79\u201391. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33675-1_7"}],"container-title":["Lecture Notes in Computer Science","Software Engineering in Health Care"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63194-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T12:51:58Z","timestamp":1569934318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63194-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319631936","9783319631943"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63194-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}