{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T20:02:48Z","timestamp":1743883368934},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319642178"},{"type":"electronic","value":"9783319642185"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64218-5_6","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T03:44:03Z","timestamp":1502423043000},"page":"72-82","source":"Crossref","is-referenced-by-count":2,"title":["Integration of the 4+1 Software Safety Assurance Principles with Scrum"],"prefix":"10.1007","author":[{"given":"Osama","family":"Doss","sequence":"first","affiliation":[]},{"given":"Tim","family":"Kelly","sequence":"additional","affiliation":[]},{"given":"Tor","family":"St\u00e5lhane","sequence":"additional","affiliation":[]},{"given":"B\u00f8rge","family":"Haugset","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Dixon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,12]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/3-540-45672-4_10","volume-title":"Extreme Programming and Agile Methods \u2014 XP\/Agile Universe 2002","author":"J Bowers","year":"2002","unstructured":"Bowers, J., May, J., Melander, E., Baarman, M., Ayoob, A.: Tailoring XP for large system mission critical software development. In: Wells, D., Williams, L. (eds.) XP\/Agile Universe 2002. LNCS, vol. 2418, pp. 100\u2013111. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45672-4_10"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-540-45122-8_4","volume-title":"Extreme Programming and Agile Methods - XP\/Agile Universe 2003","author":"R Bedoll","year":"2003","unstructured":"Bedoll, R.: A tail of two projects: how \u2018Agile\u2019 methods succeeded after \u2018Traditional\u2019 methods had failed in a critical system-development project. In: Maurer, F., Wells, D. (eds.) XP\/Agile Universe 2003. LNCS, vol. 2753, pp. 25\u201334. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45122-8_4"},{"key":"6_CR3","unstructured":"Bruce, D.: Agile analysis practices for safety-critical, 19 February 2013 http:\/\/www.ibm.com\/developerworks\/rational\/library\/agile-analysis-practicessafety-critical-development\/"},{"key":"6_CR4","unstructured":"Kelly, T.: Software certification: where is confidence won and lost? In: Anderson, T., Dale, C. (eds.) Addressing Systems Safety Challenges, Safety Critical Systems Club (2014)"},{"issue":"2","key":"6_CR5","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/2894784.2894798","volume":"41","author":"O Doss","year":"2016","unstructured":"Doss, O., Kelly, T.P.: Challenges and opportunities in agile development in safety critical systems: a survey. SIGSOFT Software Eng. Notes 41(2), 30\u201331 (2016)","journal-title":"SIGSOFT Software Eng. Notes"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Fitzgerald, B., Stol, K.J., Sullivan, R.O., Brien, D.O.: Scaling agile methods to regulated environments: an industry case study. In: 2013 35th International Conference on Software Engineering (ICSE), San Francisco, CA, pp. 863\u2013872 (2013)","DOI":"10.1109\/ICSE.2013.6606635"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Jonsson, H., Larsson, S., Punnekkat, S.: Agile practices in regulated railway software development. In: 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops (ISSREW), Dallas, TX, pp. 355\u2013360 (2012)","DOI":"10.1109\/ISSREW.2012.80"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Ge, X., Paige, R.F., McDermid, J.A.: An iterative approach for development of safety-critical software and safety arguments. In: Agile Conference, Florida, pp. 35\u201343 (2010)","DOI":"10.1109\/AGILE.2010.10"},{"key":"6_CR9","unstructured":"St\u00e5lhane, T., Myklebust, T., Hanssen, G.: The application of Scrum IEC-61508 certifiable software (2011, Unpublished)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Beznosov, K., Kruchten, P.: Towards agile security assurance. In: Proceedings of the 2004 Workshop on New Security Paradigms (NSPW 2004), pp. 47\u201354. ACM, New York (2004)","DOI":"10.1145\/1065907.1066034"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Othmane, L.B., Angin, P., Bhargava, B.: Using assurance cases to develop iteratively security features using Scrum. In: 2014 Ninth International Conference on Availability, Reliability and Security (ARES), Fribourg, pp. 490\u2013497 (2014)","DOI":"10.1109\/ARES.2014.73"},{"key":"6_CR12","volume-title":"The Survey Handbook","author":"A Flink","year":"2003","unstructured":"Flink, A.: The Survey Handbook, 2nd edn. Sage Publications, Thousand Oaks (2003)","edition":"2"},{"key":"6_CR13","volume-title":"Guide to Advanced Empirical Software Engineering","author":"F Shull","year":"2010","unstructured":"Shull, F., Singer, J., Sj\u00f8berg, D.I.K.: Guide to Advanced Empirical Software Engineering, 1st edn. Springer, London (2010)","edition":"1"},{"key":"6_CR14","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-319-33515-5_27","volume-title":"Agile Processes, in Software Engineering, and Extreme Programming","author":"O Doss","year":"2016","unstructured":"Doss, O., Kelly, T.: The 4+1 principles of software safety assurance and their implications for Scrum. In: Sharp, H., Hall, T. (eds.) XP 2016. LNBIP, vol. 251, pp. 286\u2013290. Springer, Cham (2016). doi: 10.1007\/978-3-319-33515-5_27"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Azham, Z., Ghani, I., Ithnin, N.: Security backlog in Scrum security practices\u2019. In: 5th Malaysian Conference in Software Engineering (MySEC), Johor Bahru, pp. 414\u2013417 (2011)","DOI":"10.1109\/MySEC.2011.6140708"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Doss, O., Kelly, T.: Addressing the 4+1 software safety assurance principles within Scrum. In: Proceedings of the Scientific Workshop Proceedings of XP2016 (XP 2016 Workshops). ACM, New York (2016)","DOI":"10.1145\/2962695.2962712"}],"container-title":["Communications in Computer and Information Science","Systems, Software and Services Process Improvement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64218-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T04:03:55Z","timestamp":1569989035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64218-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319642178","9783319642185"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64218-5_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}