{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:23:42Z","timestamp":1760171022025,"version":"3.37.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319662657"},{"type":"electronic","value":"9783319662664"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66266-4_4","type":"book-chapter","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T02:33:31Z","timestamp":1502850811000},"page":"55-68","source":"Crossref","is-referenced-by-count":6,"title":["Confidence Assessment Framework for Safety Arguments"],"prefix":"10.1007","author":[{"given":"Rui","family":"Wang","sequence":"first","affiliation":[]},{"given":"J\u00e9r\u00e9mie","family":"Guiochet","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Motet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"4_CR1","unstructured":"Questionnaire for safety argument assessment research, January 2017. https:\/\/goo.gl\/forms\/V3vMnl59cTWA6Lws2"},{"key":"4_CR2","unstructured":"Ayoub, A., Chang, J., Sokolsky, O., Lee, I.: Assessing the overall sufficiency of safety arguments. In: 21st Safety-Critical Systems Symposium (SSS 2013), pp. 127\u2013144 (2013)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-33678-2_26","volume-title":"Computer Safety, Reliability, and Security","author":"A Ayoub","year":"2012","unstructured":"Ayoub, A., Kim, B.G., Lee, I., Sokolsky, O.: A systematic approach to justifying sufficient confidence in software safety arguments. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012. LNCS, vol. 7612, pp. 305\u2013316. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33678-2_26"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-1-4471-1534-2_14","volume-title":"Industrial Perspectives of Safety-Critical Systems","author":"P Bishop","year":"1998","unstructured":"Bishop, P., Bloomfield, R.: A methodology for safety case development. In: Redmill, F., Anderson, T. (eds.) Industrial Perspectives of Safety-Critical Systems, pp. 194\u2013203. Springer, London (1998). doi: 10.1007\/978-1-4471-1534-2_14"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Littlewood, B., Wright, D.: Confidence: its role in dependability cases for risk assessment. In: 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2007, pp. 338\u2013346. IEEE (2007)","DOI":"10.1109\/DSN.2007.29"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Cyra, L., Gorski, J.: Supporting compliance with security standards by trust case templates. In: 2nd International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2007, pp. 91\u201398. IEEE (2007)","DOI":"10.1109\/DEPCOS-RELCOMEX.2007.44"},{"issue":"1","key":"4_CR7","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.ress.2010.06.027","volume":"96","author":"L Cyra","year":"2011","unstructured":"Cyra, L., Gorski, J.: Support for argument structures review and assessment. Reliab. Eng. Syst. Saf. 96(1), 26\u201337 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Denney, E., Pai, G., Habli, I.: Towards measurement of confidence in safety cases. In: 2011 International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 380\u2013383. IEEE (2011)","DOI":"10.1109\/ESEM.2011.53"},{"key":"4_CR9","volume-title":"A Practical Study of Argument","author":"T Govier","year":"2013","unstructured":"Govier, T.: A Practical Study of Argument. Wadsworth, Cengage Learning, Belmont (2013)"},{"key":"4_CR10","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.ssci.2016.09.014","volume":"92","author":"PJ Graydon","year":"2017","unstructured":"Graydon, P.J., Holloway, C.M.: An investigation of proposed techniques for quantifying confidence in assurance arguments. Saf. Sci. 92, 53\u201365 (2017)","journal-title":"Saf. Sci."},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-319-24255-2_23","volume-title":"Computer Safety, Reliability, and Security","author":"J Guiochet","year":"2015","unstructured":"Guiochet, J., Do Hoang, Q.A., Kaaniche, M.: A model for safety case confidence assessment. In: Koornneef, F., Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 313\u2013327. Springer, Cham (2015). doi: 10.1007\/978-3-319-24255-2_23"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-0-85729-133-2_1","volume-title":"Advances in Systems Safety","author":"R Hawkins","year":"2011","unstructured":"Hawkins, R., Kelly, T., Knight, J., Graydon, P.: A new approach to creating clear safety arguments. In: Dale, C., Anderson, T. (eds.) Advances in Systems Safety, pp. 3\u201323. Springer, London (2011). doi: 10.1007\/978-0-85729-133-2_1"},{"key":"4_CR13","unstructured":"ISO\/IEC 15026\u20132: Systems and software engineering - systems and software assurance - part 2: Assurance case, 2011. International Organization for Standardization (ISO)\/International Electrotechnical Commission (IEC)"},{"issue":"03","key":"4_CR14","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 9(03), 279\u2013311 (2001)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Kelly, T.: Arguing safety - a systematic approach to safety case management. Ph.D. thesis, Department of Computer Science, University of York (1998)","DOI":"10.1007\/3-540-48249-0_2"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-1-4471-0997-6_5","volume-title":"Computer Safety, Reliability, and Security (SAFECOMP)","author":"T Kelly","year":"1997","unstructured":"Kelly, T., McDermid, J.: Safety case construction and reuse using patterns. In: Daniel, P. (ed.) Computer Safety, Reliability, and Security (SAFECOMP), pp. 55\u201369. Springer, London (1997). doi: 10.1007\/978-1-4471-0997-6_5"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Nair, S., Walkinshaw, N., Kelly, T., de la Vara, J.L.: An evidential reasoning approach for assessing confidence in safety evidence. In: 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp. 541\u2013552, November 2015","DOI":"10.1109\/ISSRE.2015.7381846"},{"key":"4_CR18","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence, vol. 1. Princeton University Press, Princeton (1976)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-319-45559-4_20","volume-title":"Belief Functions: Theory and Applications","author":"R Wang","year":"2016","unstructured":"Wang, R., Guiochet, J., Motet, G., Sch\u00f6n, W.: D-S theory for argument confidence assessment. In: Vejnarov\u00e1, J., Kratochv\u00edl, V. (eds.) BELIEF 2016. LNCS, vol. 9861, pp. 190\u2013200. Springer, Cham (2016). doi: 10.1007\/978-3-319-45559-4_20"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66266-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T06:20:44Z","timestamp":1659334844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66266-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319662657","9783319662664"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66266-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}