{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:51:13Z","timestamp":1725519073039},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540876977"},{"type":"electronic","value":"9783540876984"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87698-4_25","type":"book-chapter","created":{"date-parts":[[2008,9,19]],"date-time":"2008-09-19T19:53:29Z","timestamp":1221854009000},"page":"291-304","source":"Crossref","is-referenced-by-count":9,"title":["Expert Assessment of Arguments: A Method and Its Experimental Evaluation"],"prefix":"10.1007","author":[{"given":"Lukasz","family":"Cyra","sequence":"first","affiliation":[]},{"given":"Janusz","family":"G\u00f3rski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Bishop, P., Bloomfield, R.: A Methodology for Safety Case Development, Industrial Perspectives of Safety-critical Systems. In: Proceedings of the Sixth Safety-critical Systems Symposium, Birmingham (1998)","DOI":"10.1007\/978-1-4471-1534-2_14"},{"key":"25_CR2","unstructured":"Bloomfield, R., Guerra, S., Masera, M., Miller, A., Sami Saydjari, O.: Assurance Cases for Security, A report from a Workshop on Assurance Cases for Security, Washington, USA (2005)"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Bloomfield, R.E., Littlewood, B., Wright, D.: Confidence: Its Role in Dependability Cases for Risk Assessment. In: 37th Annual IEEE\/IFIP International Conference Dependable Systems and Networks, pp. 338\u2013346 (2007)","DOI":"10.1109\/DSN.2007.29"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Cyra, L., Gorski, J.: Supporting Compliance with Safety Standards by Trust Case Templates. In: Proc. of ESREL 2007, Norway, vol.\u00a02, pp. 1367\u20131374 (2007)","DOI":"10.1109\/DEPCOS-RELCOMEX.2007.44"},{"issue":"5B","key":"25_CR5","first-page":"312","volume":"16","author":"L. Cyra","year":"2007","unstructured":"Cyra, L., Gorski, J.: Standard Compliance Framework for Effective Requirements Communication. Polish Journal of Environmental Studies\u00a016(5B), 312\u2013316 (2007)","journal-title":"Polish Journal of Environmental Studies"},{"key":"25_CR6","unstructured":"Cyra, L., Gorski, J.: Extending GQM by Argument Structures. In: 2nd IFIP Central and East European Conference on Software Engineering Techniques CEE-SET, pp. 1\u201316 (2007)"},{"issue":"5B","key":"25_CR7","first-page":"230","volume":"16","author":"L. Cyra","year":"2007","unstructured":"Cyra, L., Gorski, J.: Using Argument Structures to Create a Measurement Plan. Polish Journal of Environmental Studies\u00a016(5B), 230\u2013234 (2007)","journal-title":"Polish Journal of Environmental Studies"},{"key":"25_CR8","unstructured":"Cyra, L., Gorski, J.: Supporting Expert Assessment of Argument Structures in Trust Cases. In: Ninth International Probabilistic Safety Assessment and Management Conference PSAM 9, Hong Kong, China, pp. 1\u20139 (2008)"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Gorski, J., Jarzebowicz, A., Leszczyna, R., Miler, J., Olszewski, M.: Trust Case: Justifying Trust in IT Solution, Elsevier, Reliability Engineering and System Safety, vol.\u00a089, pp. 33\u201347 (2005)","DOI":"10.1016\/j.ress.2004.08.005"},{"key":"25_CR10","series-title":"NATO ARW Series","first-page":"125","volume-title":"Trust Case \u2013 a Case for Trustworthiness of IT Infrastructures, Cyberspace Security and Defence: Research Issues","author":"J. Gorski","year":"2005","unstructured":"Gorski, J.: Trust Case \u2013 a Case for Trustworthiness of IT Infrastructures, Cyberspace Security and Defence: Research Issues. NATO ARW, pp. 125\u2013142. Springer, Heidelberg (2005)"},{"key":"25_CR11","unstructured":"Gorski, J.: Collaborative Approach to Trustworthiness of IT Infrastructures. In: Proc. of IEEE International Conference on Technologies for Homeland Security and Safety TEHOSS 2005, pp. 137\u2013142 (2005)"},{"key":"25_CR12","unstructured":"Gorski, J., Zagorski, M.: Reasoning about Trust in IT Infrastructures. In: Proc. of ESREL 2005, pp. 689\u2013695 (2005)"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Greenwell, W., Strunk, E., Knight, J.: Failure Analysis and the Safety-Case Lifecycle, Human Error, Safety and Systems Development 2004, pp. 163\u2013176 (2004)","DOI":"10.1007\/1-4020-8153-7_11"},{"key":"25_CR14","unstructured":"Information Assurance Group: TCT User Manual, Gdansk University of Technology (2007), http:\/\/kio.eti.pg.gda.pl\/trust_case\/download\/TCTEditor_Users_Manual.pdf"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Josang, A., Grandison, T.: Conditional Inference in Subjective Logic. In: Proc. of the 6th International Conference on Information Fusion, Cairns, pp. 471\u2013478 (2003)","DOI":"10.1109\/ICIF.2003.177484"},{"key":"25_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1007\/11518655_69","volume-title":"Symbolic and Quantitative Approaches to Reasoning with Uncertainty","author":"A. Josang","year":"2005","unstructured":"Josang, A., Pope, S., Daniel, M.: Conditional Deduction Under Uncertainty. In: Godo, L. (ed.) ECSQARU 2005. LNCS (LNAI), vol.\u00a03571, pp. 824\u2013835. Springer, Heidelberg (2005)"},{"key":"25_CR17","unstructured":"Kelly, T.: Arguing Safety \u2013 A Systematic Approach to Managing Safety Cases. PhD Thesis, University of York, UK (1998)"},{"key":"25_CR18","series-title":"Lecture Notes in Computer Science","first-page":"271","volume-title":"Computer Safety, Reliability and Security","author":"T. Kelly","year":"1999","unstructured":"Kelly, T., McDermid, J.: A Systematic Approach to Safety Case Maintenance. In: Felici, M., Kanoun, K., Pasquini, A. (eds.) SAFECOMP 1999. LNCS, vol.\u00a01698, pp. 271\u2013284. Springer, Heidelberg (1999)"},{"key":"25_CR19","unstructured":"PIPS Project website, http:\/\/www.pips.eu.org"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Sentez, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory, SANDIA National Laboratories (2002)","DOI":"10.2172\/800792"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Shafer, G.: Mathematical Theory of Evidence. Princetown University Press (1976)","DOI":"10.1515\/9780691214696"},{"key":"25_CR22","unstructured":"Strigini, L.: Formalism and Judgement in Assurance Cases, Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities. In: Proc. of DSN 2004, Florence, Italy (2004)"},{"key":"25_CR23","volume-title":"The Uses of Argument","author":"S. Toulmin","year":"1969","unstructured":"Toulmin, S.: The Uses of Argument. Cambridge University Press, Cambridge (1969)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87698-4_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T21:18:32Z","timestamp":1631827112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87698-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540876977","9783540876984"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87698-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}