{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T16:57:38Z","timestamp":1772038658434,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319924311","type":"print"},{"value":"9783319924328","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92432-8_2","type":"book-chapter","created":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T03:08:18Z","timestamp":1527217698000},"page":"19-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Tool-Supported Safety-Relevant Component Reuse: From Specification to Argumentation"],"prefix":"10.1007","author":[{"given":"Irfan","family":"Sljivo","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Gallina","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Carlson","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Hansson","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Puri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,26]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Varnell-Sarjeant, J., Andrews, A.A., Stefik, A.: Comparing reuse strategies: an empirical evaluation of developer views. In: 8th International Workshop on Quality Oriented Reuse of Software, pp. 498\u2013503. IEEE (2014)","DOI":"10.1109\/COMPSACW.2014.83"},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/2.562936","volume":"30","author":"J-M J\u00e9z\u00e9quel","year":"1997","unstructured":"J\u00e9z\u00e9quel, J.-M., Meyer, B.: Design by contract: the lessons of Ariane. IEEE Comput. 30(1), 129\u2013130 (1997)","journal-title":"IEEE Comput."},{"key":"2_CR3","unstructured":"International Organization for Standardization (ISO). ISO 26262: Road vehicles \u2013 Functional safety. ISO (2011)"},{"key":"2_CR4","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1016\/j.jss.2016.07.034","volume":"131","author":"I Sljivo","year":"2016","unstructured":"Sljivo, I., Gallina, B., Carlson, J., Hansson, H., Puri, S.: A method to generate reusable safety case argument-fragments from compositional safety analysis. J. Syst. Softw. Spec. Issue Softw. Reuse 131, 570\u2013590 (2016)","journal-title":"J. Syst. Softw. Spec. Issue Softw. Reuse"},{"key":"2_CR5","unstructured":"Benveniste, A., Caillaud, B., Nickovic, D., Passerone, R., Raclet, J.-B., Reinkemeier, P., Sangiovanni-Vincentelli, A., Damm, W., Henzinger, T., Larsen, K.G.: Contracts for system design. Research report RR-8147, Inria, November 2012"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Sljivo, I., Gallina, B., Carlson, J., Hansson, H.: Strong and weak contract formalism for third-party component reuse. In: 3rd International Workshop on Software Certification, pp. 359\u2013364. IEEE, November 2013","DOI":"10.1109\/ISSREW.2013.6688921"},{"issue":"3","key":"2_CR7","first-page":"333","volume":"97","author":"A Cimatti","year":"2014","unstructured":"Cimatti, A., Tonetta, S.: Contracts-refinement proof system for component-based embedded systems. Sci. Comput. Program. 97(3), 333\u2013348 (2014)","journal-title":"Sci. Comput. Program."},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-319-24249-1_7","volume-title":"Computer Safety, Reliability, and Security","author":"D Ratiu","year":"2015","unstructured":"Ratiu, D., Zeller, M., Killian, L.: Safety.Lab: model-based domain specific tooling for safety argumentation. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 72\u201382. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24249-1_7"},{"issue":"3","key":"2_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2692956.2663177","volume":"34","author":"A Gacek","year":"2014","unstructured":"Gacek, A., Backes, J., Cofer, D., Slind, K., Whalen, M.: Resolute: an assurance case language for architecture models. ACM SIGADA Ada Lett. 34(3), 19\u201328 (2014)","journal-title":"ACM SIGADA Ada Lett."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Nair, S., Walkinshaw, N., Kelly, T., de la Vara, J.L.: An evidential reasoning approach for assessing confidence in safety evidence. In: 26th International Symposium on Software Reliability Engineering, pp. 541\u2013552. IEEE (2015)","DOI":"10.1109\/ISSRE.2015.7381846"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Denney, E., Pai, G.: Tool support for assurance case development. Autom. Softw. Eng., 1\u201365 (2017)","DOI":"10.1007\/s10515-017-0230-5"},{"key":"2_CR12","unstructured":"Goal Structuring Notation Working Group. GSN Community Standard V1.0. Origin Consulting (York) Limited (2011)"},{"key":"2_CR13","unstructured":"Object Management Group. SACM: Structured Assurance Case Metamodel. Technical report, V1.0 (2013). http:\/\/www.omg.org\/spec\/SACM"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-319-10506-2_12","volume-title":"Computer Safety, Reliability, and Security","author":"I Sljivo","year":"2014","unstructured":"Sljivo, I., Gallina, B., Carlson, J., Hansson, H.: Generation of safety case argument-fragments from safety contracts. In: Bondavalli, A., Di Giandomenico, F. (eds.) SAFECOMP 2014. LNCS, vol. 8666, pp. 170\u2013185. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10506-2_12"},{"key":"2_CR15","unstructured":"Object Management Group. MOFM2T: MOF Model to Text Transformation Language. Technical report, V1.0 (2008). http:\/\/www.omg.org\/spec\/MOFM2T"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Filipovikj, P., Nyberg, M., Rodriguez-Navas, G.: Reassessing the pattern-based approach for formalizing requirements in the automotive domain. In: 22nd International Requirements Engineering Conference. IEEE, August 2014","DOI":"10.1109\/RE.2014.6912296"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technologies \u2013 Ada-Europe 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92432-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:21:13Z","timestamp":1709810473000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-92432-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319924311","9783319924328"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92432-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Ada-Europe","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ada-Europe International Conference on Reliable Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adaeurope2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ae2018.di.fc.ul.pt\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}