{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:19Z","timestamp":1740099079824,"version":"3.37.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319983844"},{"type":"electronic","value":"9783319983851"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98385-1_17","type":"book-chapter","created":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T03:47:49Z","timestamp":1532576869000},"page":"244-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Trustworthiness Cases \u2013 Toward Preparation for the Trustworthiness Certification"],"prefix":"10.1007","author":[{"given":"Nazila","family":"Gol Mohammadi","sequence":"first","affiliation":[]},{"given":"Nelufar","family":"Ulfat-Bunyadi","sequence":"additional","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Anisetti, M., Ardagna, C.A., Gaudenzi, F., Damiani, E.: A certification framework for cloud-based services. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing, SAC, NY, USA, pp. 440\u2013447 (2016)","DOI":"10.1145\/2851613.2851628"},{"key":"17_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-84996-086-1_4","volume-title":"Making Systems Safer","author":"R Bloomfield","year":"2010","unstructured":"Bloomfield, R., Bishop, P.: Safety and assurance cases: past, present and possible future - an adelard perspective. In: Dale, C., Anderson, T. (eds.) Making Systems Safer, pp. 51\u201367. Springer, London (2010). https:\/\/doi.org\/10.1007\/978-1-84996-086-1_4"},{"key":"17_CR3","unstructured":"Bloomfield, R., Masera, M., Miller, A., Saydjari, O.S., Weinstock, C.B.: Assurance cases for security: the metrics challenge. In: A Report from a Workshop on Assurance Cases for Security, Edinburgh, UK (2007). http:\/\/ieeexplore.ieee.org\/document\/4273036\/"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-34059-8_1","volume-title":"Large-Scale Complex IT Systems. Development, Operation and Management","author":"M Broy","year":"2012","unstructured":"Broy, M., Cengarle, M.V., Geisberger, E.: Cyber-physical systems: imminent challenges. In: Calinescu, R., Garlan, D. (eds.) Monterey Workshop 2012. LNCS, vol. 7539, pp. 1\u201328. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34059-8_1"},{"key":"17_CR5","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-319-25360-2_8","volume-title":"Cyber Security and Privacy","author":"F Di Cerbo","year":"2015","unstructured":"Di Cerbo, F., Gol Mohammadi, N., Paulus, S.: Evidence-based trustworthiness of internet-based services through controlled software development. In: Cleary, F., Felici, M. (eds.) Cyber Security and Privacy. CCIS, vol. 530, pp. 91\u2013102. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25360-2_8"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Di Cerbo, F., Kaluvuri, S.P., Motte, F., Nasser, B., Chen, W.X., Short, S.: Towards a linked data vocabulary for the certification of software properties. In: 10th International Conference on Signal-Image Technology and Internet-Based Systems, pp. 721\u2013727 (2014)","DOI":"10.1109\/SITIS.2014.29"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Gol Mohammadi, N., Bandyszak, T., Kalogiros, C., Kanakakis, M., Weyer, T.: A framework for evaluating the end-to-end trustworthiness. In: Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) (2015)","DOI":"10.1109\/Trustcom.2015.429"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-09770-1_1","volume-title":"Trust, Privacy, and Security in Digital Business","author":"N Gol Mohammadi","year":"2014","unstructured":"Gol Mohammadi, N., et al.: Maintaining trustworthiness of socio-technical systems at run-time. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds.) TrustBus 2014. LNCS, vol. 8647, pp. 1\u201312. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-09770-1_1"},{"key":"17_CR9","unstructured":"Gol Mohammadi, N., Bandyszak, T., Paulus, S., Meland, P.H., Weyer, T., Pohl, K.: Extending software development methodologies to support trustworthiness-by-design. In: Proceedings of the CAiSE Forum at the 27th International Conference on Advanced Information Systems Engineering, Co-located with CAiSE, pp. 213\u2013220 (2015)"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-44341-6_1","volume-title":"Trust, Privacy and Security in Digital Business","author":"NG Mohammadi","year":"2016","unstructured":"Mohammadi, N.G., Heisel, M.: A framework for systematic analysis and modeling of trustworthiness requirements using i* and BPMN. In: Katsikas, S., Lambrinoudakis, C., Furnell, S. (eds.) TrustBus 2016. LNCS, vol. 9830, pp. 3\u201318. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44341-6_1"},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"46","DOI":"10.3390\/info8020046","volume":"8","author":"N Gol Mohammadi","year":"2017","unstructured":"Gol Mohammadi, N., Heisel, M.: A framework for systematic refinement of trustworthiness requirements. Information 8(2), 46 (2017)","journal-title":"Information"},{"key":"17_CR12","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-11561-0_2","volume-title":"Cloud Computing and Services Science","author":"N Gol Mohammadi","year":"2014","unstructured":"Gol Mohammadi, N., et al.: Trustworthiness attributes and metrics for engineering trusted internet-based software systems. In: Helfert, M., Desprez, F., Ferguson, D., Leymann, F. (eds.) CLOSER 2013. CCIS, vol. 453, pp. 19\u201335. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11561-0_2"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Graydon, P.J., Knight, J.C., Strunk, E.A.: Assurance based development of critical systems. In: 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 347\u2013357 (2007)","DOI":"10.1109\/DSN.2007.17"},{"key":"17_CR14","unstructured":"GSN Working Group. The 1st version of the Goal Structuring Notation (GSN) Standard, Version 1, November 2011. http:\/\/www.goalstructuringnotation.info\/"},{"issue":"3","key":"17_CR15","doi-asserted-by":"publisher","first-page":"195","DOI":"10.3390\/e20030195","volume":"20","author":"Qiang Han","year":"2018","unstructured":"Han, Q.: Trustworthiness measurement algorithm for TWfMS based on software behaviour entropy. Entropy, 20(3) (2018). Article no. 195","journal-title":"Entropy"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.ssci.2013.04.007","volume":"59","author":"R Hawkins","year":"2013","unstructured":"Hawkins, R., Habli, I., Kelly, T., McDermid, J.: Assurance cases and prescriptive software safety certification: a comparative study. Saf. Sci. 59, 55\u201371 (2013)","journal-title":"Saf. Sci."},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Hawkins, R., Kelly, T.: A structured approach to selecting and justifying software safety evidence. In: Proceedings of the 5th IET International Conference on System Safety, pp. 31\u201337 (2010)","DOI":"10.1049\/cp.2010.0825"},{"issue":"4","key":"17_CR18","first-page":"25","volume":"46","author":"R Hawkins","year":"2010","unstructured":"Hawkins, R., Kelly, T.: A systematic approach for developing software safety arguments. J. Syst. Saf. Hazard Prev. 46(4), 25 (2010)","journal-title":"J. Syst. Saf. Hazard Prev."},{"key":"17_CR19","unstructured":"ISO\/IEC 17021-1. Conformity assessment - Requirements for bodies providing audit and certification of management systems - Part 1: Requirements - Requirements. Technical report (2015)"},{"key":"17_CR20","unstructured":"ISO\/IEC 21827. Information technology, Security techniques, Systems Security Engineering - Capability Maturity Model (SSE-CMM). Technical report (2008)"},{"key":"17_CR21","unstructured":"ISO\/IEC 25021. Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE) - Quality measure elements. Technical report (2012)"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Kaluvuri, S.P., Koshutanski, H., Cerbo, F.D., Mana, A.: Security assurance of services through digital security certificates. In: Proceeding of the 20th International Conference on Web Services (ICWS), pp. 98\u2013102. IEEE (2013)","DOI":"10.1109\/ICWS.2013.78"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Kelly, T.P.: Arguing safety - a systematic approach to managing safety cases. Dissertation, Department of Computer Science, The University of York (1998)","DOI":"10.1007\/3-540-48249-0_2"},{"key":"17_CR24","unstructured":"Krotsiani, M., Spanoudakis, G., Mahbub, K.: Incremental certification of cloud services. In: 7th International Conference on Emerging Security Information, Systems and Technologie, SECURWARE (2018)"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Lotz, V., Kaluvuri, S.P., Di Cerbo, F., Sabetta, A.: Towards security certification schemas for the internet of services. In: Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1\u20135 (2012)","DOI":"10.1109\/NTMS.2012.6208771"},{"key":"17_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis. The CORAS Approach","author":"MS Lund","year":"2010","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis. The CORAS Approach. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12323-8"},{"key":"17_CR27","unstructured":"National Research Council, Jackson, D., Martyn, T. (eds.): Software for Dependable Systems: Sufficient Evidence? Committee on Certifiably Dependable Software Systems, Computer Science and Telecommunications Board, The National Academies Press, Washington, D.C. (2007)"},{"key":"17_CR28","doi-asserted-by":"publisher","first-page":"954","DOI":"10.1016\/j.procs.2013.09.179","volume":"22","author":"V Patu","year":"2013","unstructured":"Patu, V., Yamamoto, S.: How to develop security case by combining real life security experiences (evidence) with d-case. Procedia Comput. Sci. 22, 954\u2013959 (2013). 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems - KES","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"17_CR29","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/S1353-4858(09)70008-X","volume":"2009","author":"B Potter","year":"2009","unstructured":"Potter, B.: Threat modelling: Microsoft SDL threat modelling tool. Netw. Secur. 2009(1), 15\u201318 (2009)","journal-title":"Netw. Secur."},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Surridge, M., Nasser, B.I., Chen, X., Chakravarthy, A., Melas, P.: Run-time risk management in adaptive ICT systems. In: International Conference on Availability, Reliability and Security, ARES, pp. 102\u2013110. IEEE (2013)","DOI":"10.1109\/ARES.2013.20"},{"key":"17_CR31","volume-title":"Trust: A Sociological Theory","author":"P Sztompka","year":"1999","unstructured":"Sztompka, P.: Trust: A Sociological Theory. Cambridge University Press, Cambridge (1999)"},{"key":"17_CR32","unstructured":"Weinstock, C.B., Lipson, H.F., Goodenough, J.: Arguing Security - Creating Security Assurance Cases (2007). https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2013_019_001_293637.pdf"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98385-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T05:41:40Z","timestamp":1661665300000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98385-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983844","9783319983851"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98385-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}