{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:27Z","timestamp":1762004907812,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319662831"},{"type":"electronic","value":"9783319662848"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66284-8_7","type":"book-chapter","created":{"date-parts":[[2017,9,2]],"date-time":"2017-09-02T08:14:30Z","timestamp":1504340070000},"page":"70-80","source":"Crossref","is-referenced-by-count":20,"title":["Towards Combined Safety and Security Constraints Analysis"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Pereira","sequence":"first","affiliation":[]},{"given":"Celso","family":"Hirata","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Pagliares","sequence":"additional","affiliation":[]},{"given":"Simin","family":"Nadjm-Tehrani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"7_CR1","unstructured":"Johnson C.: Why we cannot (yet) ensure the cyber-security of safety-critical systems. http:\/\/eprints.gla.ac.uk\/130822\/1\/130822.pdf . Accessed 2017\/05\/14"},{"key":"7_CR2","volume-title":"Engineering a Safer World: Systems Thinking Applied to Safety","author":"N Leveson","year":"2011","unstructured":"Leveson, N.: Engineering a Safer World: Systems Thinking Applied to Safety. MIT Press, Cambridge (2011)"},{"key":"7_CR3","unstructured":"Leveson, N.: An STPA Primer:What is STPA? http:\/\/sunnyday.mit.edu\/STPA-Primer-v0.pdf . Accessed 12 May 2017"},{"issue":"2","key":"7_CR4","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/2556938","volume":"57","author":"W Young","year":"2014","unstructured":"Young, W., Leveson, N.: An integrated approach to safety and security based on systems theory. Commun. ACM 57(2), 31\u201335 (2014)","journal-title":"Commun. ACM"},{"key":"7_CR5","first-page":"183","volume":"34","author":"I Friedberg","year":"2016","unstructured":"Friedberg, I., McLaughlin, K., Smith, P., Laverty, D., Sezer, S.: STPA-SafeSec: safety and security analysis for cyber-physical systems. J. Inf. Secur. Appl. 34, 183\u2013196 (2016)","journal-title":"J. Inf. Secur. Appl."},{"key":"7_CR6","unstructured":"National Institute of Standards and Technology: NIST Special Publication 800-30 Revision 1, Guide for Conducting Risk Assessments (2012)"},{"key":"7_CR7","unstructured":"RTCA DO-326A: Airworthiness security process specification. RTCA (2014)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Oates, R., Foulkes, D., Herries, G., Banham, D.: Practical extensions of safety critical engineering processes for securing industrial control systems. In: 8th IET International System Safety Conference incorporating the Cyber Security Conference Proceedings, pp. 1\u20136. IET, Cardiff (2013)","DOI":"10.1049\/cp.2013.1704"},{"issue":"2","key":"7_CR9","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/JSYST.2013.2294628","volume":"10","author":"N Subramanian","year":"2016","unstructured":"Subramanian, N., Zalewski, J.: Quantitative assessment of safety and security of system architectures for cyberphysical systems using the NFR approach. IEEE Syst. J. 10(2), 397\u2013409 (2016)","journal-title":"IEEE Syst. J."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Nostro, N., Bondavalli, A., Silva, N.: Adding security concerns to safety critical certification. In: IEEE International Symposium on Software Reliability Engineering Workshops Proceedings, Naples (2014)","DOI":"10.1109\/ISSREW.2014.56"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Thomas, J.: Extending and automating a systems-theoretic hazard analysis for requirements generation and analysis. MIT Ph.D. dissertation, Cambridge (2013)","DOI":"10.2172\/1044959"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Troubitsyna, E.: An integrated approach to deriving safety and security requirements from safety cases. In: IEEE 40th Annual Computer Software and Applications Conference Proceedings, Atlanta (2016)","DOI":"10.1109\/COMPSAC.2016.58"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Katta, V., Raspotnig, C., Karpati, P., St\u00e5lhane, T.: Requirements management in a combined process for safety and security assessments. In: International Conference on Availability, Reliability and Security, Regensburg (2013)","DOI":"10.1109\/ARES.2013.104"},{"key":"7_CR14","unstructured":"Netkachova, K., M\u00fcller, K., Paulitsch, M., Bloomfield, R.: Security-informed safety case approach to analysing MILS systems. In: International Workshop on MILS: Architecture and Assurance for Secure Systems, Amsterdam (2015)"},{"issue":"6","key":"7_CR15","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MS.2004.40","volume":"21","author":"A Egyed","year":"2004","unstructured":"Egyed, A., Grunbacher, P.: Identifying requirements conflicts and cooperation: how quality attributes and automated traceability can help. IEEE Softw. 21(6), 50\u201358 (2004)","journal-title":"IEEE Softw."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Tabassum, M., Siddik, M., Shoyaib, M., Khaled, S.: Determining interdependency among non-functional requirements to reduce conflict. In: International Conference on Informatics, Electronics & Vision (ICIEV), Dhaka (2014)","DOI":"10.1109\/ICIEV.2014.6850720"},{"issue":"6","key":"7_CR17","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-sen.2014.0153","volume":"9","author":"H Hu","year":"2015","unstructured":"Hu, H., Ma, Q., Zhang, T., Tan, Y., Xiang, H., Fu, C., Feng, Y.: Semantic modelling and automated reasoning of non-functional requirement conflicts in the context of softgoal interdependencies. IET Softw. 9(6), 145\u2013156 (2015)","journal-title":"IET Softw."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Sadana, V., Liu, X.: Analysis of conflicts among non-functional requirements using integrated analysis of functional and non-functional requirements. In: 31st Annual International Computer Software and Applications Conference Proceedings, Beijing (2007)","DOI":"10.1109\/COMPSAC.2007.73"},{"issue":"1","key":"7_CR19","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/JSYST.2014.2315597","volume":"10","author":"A Salado","year":"2016","unstructured":"Salado, A., Nilchiani, R.: The concept of order of conflict in requirements engineering. IEEE Syst. J. 10(1), 25\u201335 (2016)","journal-title":"IEEE Syst. J."},{"key":"7_CR20","unstructured":"Pereira, D., Hirata, C., Pagliares, R., De Lemos, F.: STPA-Sec for security of flight management system. In: 2017 STAMP Workshop (2017). http:\/\/psas.scripts.mit.edu\/home\/2017-stamp-presentations\/ . Accessed 12 May 2017"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66284-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T22:48:31Z","timestamp":1570056511000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66284-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319662831","9783319662848"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66284-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}