{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:50:56Z","timestamp":1725519056444},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540876977"},{"type":"electronic","value":"9783540876984"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87698-4_22","type":"book-chapter","created":{"date-parts":[[2008,9,19]],"date-time":"2008-09-19T15:53:29Z","timestamp":1221839609000},"page":"249-262","source":"Crossref","is-referenced-by-count":10,"title":["Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information"],"prefix":"10.1007","author":[{"given":"Nurlida","family":"Basir","sequence":"first","affiliation":[]},{"given":"Ewen","family":"Denney","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Fischer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"ASCE home page (2007), http:\/\/www.adelard.com\/web\/hnav\/ASCE"},{"key":"22_CR2","first-page":"11","volume-title":"Proc. of the IEEE Aerospace Conference","author":"N.C. Audsley","year":"2003","unstructured":"Audsley, N.C., Bate, I.J., Crook-Dawkins, S.K.: Automatic Code Generation for Airborne Systems. In: Proc. of the IEEE Aerospace Conference, p. 11. IEEE, Los Alamitos (2003)"},{"key":"22_CR3","volume-title":"SafeCert 2008 Intl. Workshop on the Certification of Safety-Critical Software Controlled Systems, ENTCS","author":"N. Basir","year":"2008","unstructured":"Basir, N., Denney, E., Fischer, B.: Deriving Safety Cases for the Formal Safety Certification of Automatically Generated Code. In: Huhn, M., Hungar, H. (eds.) SafeCert 2008 Intl. Workshop on the Certification of Safety-Critical Software Controlled Systems, ENTCS. Elsevier, Amsterdam (2008)"},{"key":"22_CR4","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/978-1-4471-1534-2_14","volume-title":"Industrial Perspectives of Safety-critical Systems: Proc. 6th Safety-critical Systems Symposium","author":"P. Bishop","year":"1998","unstructured":"Bishop, P., Bloomfield, R.: A methodology for safety case development. In: Redmill, F., Anderson, T. (eds.) Industrial Perspectives of Safety-critical Systems: Proc. 6th Safety-critical Systems Symposium, pp. 194\u2013203. Springer, Heidelberg (1998)"},{"key":"22_CR5","volume-title":"Generative Programming: Methods, Tools, and Applications","author":"K. Czarnecki","year":"2000","unstructured":"Czarnecki, K., Eisenecker, U.W.: Generative Programming: Methods, Tools, and Applications. Addison-Wesley, Reading (2000)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1007\/978-3-540-45236-2_48","volume-title":"Proc. FM 2003: Formal Methods","author":"E. Denney","year":"2003","unstructured":"Denney, E., Fischer, B.: Correctness of source-level safety policies. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) Proc. FM 2003: Formal Methods. LNCS, vol.\u00a02805, pp. 894\u2013913. Springer, Heidelberg (2003)"},{"key":"22_CR7","first-page":"1","volume-title":"Proc. ASE Workshop on Software Certificate Management Systems","author":"E. Denney","year":"2005","unstructured":"Denney, E., Fischer, B.: Software certification and software certificate management systems (Position paper). In: Proc. ASE Workshop on Software Certificate Management Systems, pp. 1\u20135. ACM, New York (2005)"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/1173706.1173725","volume-title":"Proc. Conf. Generative Programming and Component Engineering","author":"E. Denney","year":"2006","unstructured":"Denney, E., Fischer, B.: A generic annotation inference algorithm for the safety certification of automatically generated code. In: Jarzabek, S., Schmidt, D.C., Veldhuizen, T.L. (eds.) Proc. Conf. Generative Programming and Component Engineering, pp. 121\u2013130. ACM, New York (2006)"},{"key":"22_CR9","first-page":"265","volume-title":"Proc. 21st\u00a0ASE","author":"E. Denney","year":"2006","unstructured":"Denney, E., Fischer, B.: Annotation inference for safety certification of automatically generated code (extended abstract). In: Uchitel, S., Easterbrook, S. (eds.) Proc. 21st\u00a0ASE, pp. 265\u2013268. IEEE, Los Alamitos (2006)"},{"key":"22_CR10","volume-title":"Electronic Proc. IEEE Aerospace Conference","author":"E. Denney","year":"2008","unstructured":"Denney, E., Trac, S.: A Software Safety Certification Tool for Automatically Generated Guidance, Navigation and Control Code. In: Electronic Proc. IEEE Aerospace Conference. IEEE, Los Alamitos (2008)"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11561347_3","volume-title":"Generative Programming and Component Engineering","author":"E. Denney","year":"2005","unstructured":"Denney, E., Fischer, B.: Certifiable program generation. In: Gl\u00fcck, R., Lowry, M. (eds.) GPCE 2005. LNCS, vol.\u00a03676, pp. 17\u201328. Springer, Heidelberg (2005)"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/DASC.2005.1563405","volume-title":"The 24th Digital Avionics Systems Conference","author":"A. Galloway","year":"2005","unstructured":"Galloway, A., Paige, R.F., Tudor, N.J., Weaver, R.A., Toyn, I., McDermid, J.: Proof vs testing in the context of safety standards. In: The 24th Digital Avionics Systems Conference, vol.\u00a02, p. 14. IEEE Press, Los Alamitos (2005)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Hughes, W.: Critical Thinking. Broadview Press (1992)","DOI":"10.1007\/978-1-349-12527-2_12"},{"key":"22_CR14","unstructured":"Kelly, T.P.: Arguing safety a systematic approach to managing safety cases. PhD Thesis, University of York (1998)"},{"key":"22_CR15","volume-title":"Safeware: System Safety and Computers","author":"N.G. Leveson","year":"1995","unstructured":"Leveson, N.G.: Safeware: System Safety and Computers. Addison-Wesley, Reading (1995)"},{"key":"22_CR16","first-page":"106","volume-title":"Proc. 24th Conf. Principles of Programming Languages","author":"G.C. Necula","year":"1997","unstructured":"Necula, G.C.: Proof-carrying code. In: Proc. 24th Conf. Principles of Programming Languages, pp. 106\u2013119. ACM, New York (1997)"},{"key":"22_CR17","first-page":"277","volume-title":"Proc.15th Conf. Automated Software Engineering","author":"C. O\u2019Halloran","year":"2000","unstructured":"O\u2019Halloran, C.: Issues for the automatic generation of safety critical software. In: Proc.15th Conf. Automated Software Engineering, pp. 277\u2013280. IEEE, Los Alamitos (2000)"},{"key":"22_CR18","unstructured":"PolySpace Technologies, http:\/\/www.polyspace.com"},{"key":"22_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/BFb0015471","volume-title":"KORSO: Methods, Languages and Tools for the Construction of Correct Software","author":"W. Reif","year":"1995","unstructured":"Reif, W.: The KIV Approach to Software Verification. In: KORSO: Methods, Languages and Tools for the Construction of Correct Software. LNCS, vol.\u00a01009, pp. 339\u2013370. Springer, Heidelberg (1995)"},{"key":"22_CR20","unstructured":"Reinhardt, D.W.: Use of the C++ Programming Language in Safety Critical Systems. Master Thesis, University of York (2004)"},{"key":"22_CR21","unstructured":"RTCA, Software Considerations in Airborne Systems and Equipment Certification. RTCA (1992)"},{"issue":"9","key":"22_CR22","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/32.58788","volume":"16","author":"D.R. Smith","year":"1990","unstructured":"Smith, D.R.: KIDS: A semi-automatic program development system. IEEE Trans. on Software Engineering\u00a016(9), 286\u2013290 (1990)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"22_CR23","series-title":"LNAI","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-58156-1_24","volume-title":"Proc. 12th Conf. Automated Deduction","author":"M. Stickel","year":"1994","unstructured":"Stickel, M., Waldinger, R., Lowry, M., Pressburger, T., Underwood, I.: Deductive composition of astronomical software from subroutine libraries. In: Proc. 12th Conf. Automated Deduction. LNCS (LNAI), vol.\u00a0814, pp. 341\u2013355. Springer, Heidelberg (1994)"},{"key":"22_CR24","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/ASE.2003.1240322","volume-title":"Proc. 18th Conf. Automated Software Engineering","author":"I. St\u00fcrmer","year":"2003","unstructured":"St\u00fcrmer, I., Conrad, M.: Test suite design for code generation tools. In: Proc. 18th Conf. Automated Software Engineering, pp. 286\u2013290. IEEE, Los Alamitos (2003)"},{"key":"22_CR25","first-page":"1","volume-title":"Proc. of 2nd Intl. ICSE Workshop on Software Engineering for Automotive Systems","author":"I. St\u00fcrmer","year":"2006","unstructured":"St\u00fcrmer, I., Weinberg, D., Conrad, M.: Overview of Existing Safeguarding Techniques for Automatically Generated Code. In: Proc. of 2nd Intl. ICSE Workshop on Software Engineering for Automotive Systems, pp. 1\u20136. ACM, New York (2006)"},{"key":"22_CR26","unstructured":"Weaver, R.A.: The Safety of Software\u2013Constructing and Assuring Arguments. PhD Thesis, University of York (2003)"},{"key":"22_CR27","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/HASE.1999.809497","volume-title":"Proc. 4th High Assurance in Systems Engineering Workshop","author":"M.W. Whalen","year":"1999","unstructured":"Whalen, M.W., Heimdahl, M.P.E.: On the requirements of High-Integrity Code Generation. In: Proc. 4th High Assurance in Systems Engineering Workshop, pp. 217\u2013224. IEEE, Los Alamitos (1999)"},{"issue":"4","key":"22_CR28","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1145\/1039813.1039816","volume":"30","author":"J. Whittle","year":"2004","unstructured":"Whittle, J., Schumann, J.: Automating the implementation of Kalman filter algorithms. ACM Transactions on Mathematical Software\u00a030(4), 434\u2013453 (2004)","journal-title":"ACM Transactions on Mathematical Software"},{"key":"22_CR29","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1023\/A:1008643803725","volume":"14","author":"W. Wong","year":"1999","unstructured":"Wong, W.: Validation of HOL proofs by proof checking. Formal Methods in System Design: An International Journal\u00a014, 193\u2013212 (1999)","journal-title":"Formal Methods in System Design: An International Journal"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87698-4_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:05:47Z","timestamp":1606165547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87698-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540876977","9783540876984"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87698-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}