{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:38:15Z","timestamp":1742996295052,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642142604"},{"type":"electronic","value":"9783642142611"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-14261-1_2","type":"book-chapter","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T18:07:42Z","timestamp":1297188462000},"page":"5-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["\u201cOpen Proof\u201d for Railway Safety Software - A Potential Way-Out of Vendor Lock-in Advancing to Standardization, Transparency, and Software Security"],"prefix":"10.1007","author":[{"given":"Klaus-R\u00fcdiger","family":"Hase","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,31]]},"reference":[{"key":"2_CR1","unstructured":"The European Railway Agency (ERA): ERTMS Technical Documentation, System requirements Specification - Baseline 3, SUBSET- 026 v300, published 01\/01\/2010. http:\/\/www.era.europa.eu\/Document-Register\/Pages\/SUBSET-026v300.aspx"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Thompson, Ken: Reflections on Trusting Trust; Reprinted from Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. http:\/\/cm.bell-labs.com\/who\/ken\/trust.html","DOI":"10.1145\/358198.358210"},{"key":"2_CR3","unstructured":"Wheeler, David A.: High Assurance (for Security or Safety) and Free-Libre \/ Open Source Software (FLOSS); updated 20\/11\/2009; http:\/\/www.dwheeler.com\/essays\/high-assurance-floss.html"},{"key":"2_CR4","unstructured":"Wysopal, Chris; Eng, Chris: Static Detection of Application Backdoors, Veracode Inc., Burlington, MA USA, 2007 http:\/\/www.veracode.com\/images\/stories\/static-detection-of-backdoors-1.0.pdf"},{"key":"2_CR5","unstructured":"Poulsen, Kevin, \u201cBorland Interbase backdoor exposed\u201d, The Register, Jan. 2001, http:\/\/www.theregister.co.uk\/2001\/01\/12\/borland\\_interbase\\_backdoor\\_exposed"},{"key":"2_CR6","unstructured":"EUROPEAN PARLIAMENT: REPORT on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001\/2098(INI)), Part 1: Motion for a resolution: A5-0264\/2001, 11. July 2001. http:\/\/www.europarl.europa.eu\/comparl\/tempcom\/echelon\/pdf\/rapport\\_echelon\\\\\\_en.pdf"},{"key":"2_CR7","unstructured":"FINANCIAL TIMES Europe: \u201cStuxnet worm causes worldwide alarm\u201d, by Joseph Menn and Mary Watkins, Published: Sept. 24, 2010, Pages 1 and 3 or online version: http:\/\/www.ft.com\/cms\/s\/0\/cbf707d2-c737-11df-aeb1-00144feab49a.html"},{"key":"2_CR8","unstructured":"Schweizerische Eidgenossenschaft, UUS: Schlussbericht der Unfalluntersuchungsstelle Bahnen und Schiffe \u00fcber die Entgleisung von G\u00fcterzug 43647 der BLS AG vom Dienstag, 16. Oktober 2007, in Frutigen. http:\/\/www.uus.admin.ch\/pdf\/07101601\\_SB.pdf"},{"key":"2_CR9","unstructured":"Klaeren, Herbert: \u201cSkriptum Softwaretechnik\u201d, Universit\u00e4t T\u00fcbingen, Okt. 2007, http:\/\/www-pu.informatik.uni-tuebingen.de\/users\/klaeren\/sweinf.pdf"},{"key":"2_CR10","unstructured":"McConnell, Steve: Code Complete, 2nd ed. 2004, Microsoft Press; Redmond, Washington 98052-6399, USA, ISBN 0-7356-1967-0"},{"issue":"6","key":"2_CR11","first-page":"44","volume":"7","author":"H. Cobb Richard","year":"1990","unstructured":"Richard H. Cobb, Harlan D. Mills: Engineering Software under Statistical Quality Control. IEEE Software 7(6): 44-54 (1990)","journal-title":"IEEE Software"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Dvorak, Daniel L., (Editor): NASA Study on Flight Software Complexity, Final Report, California Institute of Technology, 2008 Report: http:\/\/www.nasa.gov\/pdf\/418878main\\_FSWC\\_Final\\_Report.pdf Presentation: http:\/\/pmchallenge.gsfc.nasa.gov\/docs\/2009\/presentations\/Dvorak.Dan.pdf","DOI":"10.2514\/6.2009-1882"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Ostrand, T. J. et al: Where the Bugs Are. In: Rothermel, G. (Hrsg.): Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis, Vol. 29, 2004, Pages 86-96; http:\/\/portal.acm.org\/ see also: http:\/\/www-pu.informatik.uni-tuebingen.de\/users\/klaeren\/sw.pdf (German)","DOI":"10.1145\/1007512.1007524"},{"key":"2_CR14","unstructured":"Randell, B.: The NATO Software Engineering Conferences, 1968\/1969: http:\/\/homepages.cs.ncl.ac.uk\/brian.randell\/NATO\/"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Dijkstra, Edsger W.: The Humble Programmer, ACM Turing Lecture 1972. http:\/\/userweb.cs.utexas.edu\/users\/EWD\/ewd03xx\/EWD340.PDF","DOI":"10.1145\/1283920.1283927"},{"key":"2_CR16","unstructured":"Sukale, Margret: Taschenbuch der Eisenbahngesetze, Hestra-Verlag, 13.Auflage 2002"},{"key":"2_CR17","unstructured":"Raymond, Eric Steven: The Cathedral and the Bazaar, version 3.0, 11 Sept. 2000 http:\/\/www.catb.org\/~esr\/writings\/cathedral-bazaar\/cathedral-bazaar\/ar01s04.html"},{"key":"2_CR18","unstructured":"Pfleeger, Charles P.; Pfleeger, Shari Lawrence: Security in Computing. Fourth edition. ISBN 0-13-239077-9"},{"key":"2_CR19","unstructured":"Biggerstaff, Ted J.: A Perspective of Generative Reuse, Technical Report, MSR-TR-97-26,1997, Microsoft Corporation http:\/\/research.microsoft.com\/pubs\/69632\/tr-97-26.pdf"},{"key":"2_CR20","unstructured":"Rix, Malcolm: \u201cCase Study of a Successful Firmware Reuse Program,\u201d WISR (Workshop on the Institutionalization of Reuse), Palo Alto, CA,. ftp:\/\/gandalf.umcs.maine.edu\/pub\/WISR\/wisr5\/proceedings\/"},{"key":"2_CR21","unstructured":"Watts S. Humphrey; Winning with Software: An Executive Strategy, 2001 by Addison-Wesley, 1st Edition; ISBN-10: 0-201-77639-1"},{"key":"2_CR22","unstructured":"UNU-MERIT, (NL): Economic impact of open source software on innovation and the competitiveness of the Information and Communication Technologies (ICT) sector http:\/\/ec.europa.eu\/enterprise\/sectors\/ict\/files\/2006-11-20-flossimpact\\_en.pdf"},{"key":"2_CR23","unstructured":"Free Software Foundation, Inc.; 51 Franklin Street, Boston, MA 02110-1301, USA: http:\/\/www.gnu.org\/philosophy\/free-sw.html"},{"key":"2_CR24","unstructured":"David A. Wheeler: Open Source Software (OSS or FLOSS) and the U.S. Department of Defense, November 4, 2009; http:\/\/www.dwheeler.com\/essays\/dod-oss.ppt"},{"key":"2_CR25","unstructured":"European Commission, European Union Public License - EUPL v.1.1, Jan. 9, 2009. http:\/\/ec.europa.eu\/idabc\/en\/document\/7774"},{"key":"2_CR26","unstructured":"European Commission, iDABC, European eGovernment Services; OSOR; Guideline on public procurement of Open Source Software, March 2010, http:\/\/www.osor.eu\/idabc-studies\/OSS-procurement-guideline\\%20-final.pdf"},{"key":"2_CR27","unstructured":"Wikipedia, terminology: \u201cCopyleft\u201d http:\/\/en.wikipedia.org\/wiki\/Copyleft"},{"key":"2_CR28","unstructured":"Eclipse Foundation, \u201cAbout the Eclipse Foundation\u201d, http:\/\/www.eclipse.org\/org\/\\#about"},{"key":"2_CR29","unstructured":"TOPCASED: The Open Source Toolkit for Critical Systems; http:\/\/www.topcased.org\/"},{"key":"2_CR30","unstructured":"Duhoux, Maarten: \u201cRespecting EN 50128 change control requirements using BugZilla variants\u201d, Signal+Draht, Heft 07+08\/2010, EurailPress http:\/\/www.eurailpress.de\/sd-archiv\/number\/07\\_082010-1.html"},{"key":"2_CR31","unstructured":"DIN EN 50128; VDE 0831-128:2009-10; Railway applications - Communication, signal-ling and processing systems - Software for railway control and protection systems; version prEN 50128:2009; Beuth Verlag, Germany, http:\/\/www.vde-verlag.de\/previewpdf\/71831014.pdf (index only)"},{"key":"2_CR32","unstructured":"Wheeler, David A.: Countering the Trusting Trust through Diverse Double- Compiling (DDC) 2009 PhD dissertation, George Mason University, Fairfax, Virginia http:\/\/www.dwheeler.com\/trusting-trust\/"},{"key":"2_CR33","unstructured":"Open Proof: http:\/\/www.openproofs.org\/"},{"key":"2_CR34","unstructured":"Jan Peleska: Formal Methods and the Development of Dependable Systems, Habilitationsschrift, Bericht Nr. 9612, Universit\u00e4t Bremen, 1996. http:\/\/www.informatik.uni-bremen.de\/agbs\/jp\/papers\/habil.ps.gz"},{"key":"2_CR35","unstructured":"Anne E. Haxthausen, Jan Peleska and Sebastian Kinder: A formal approach for the construction and verification of railway control systems, Journal: Formal Aspects of Computing. Published online: 17 December 2009. DOI: 10.1007\/s00165-009-0143-6 Springer, ISSN 0934-5043 (Print) 1433-299X (Online) http:\/\/springerlink.metapress.com\/content\/l3707144674h14m5\/fulltext.pdf"},{"key":"2_CR36","unstructured":"Lorenz D\u00e4ubler, Michael Meyer zu H\u00f6rste, Gert Bikker, Eckehard Schnieder; Formale Spezifikation von Zugleitsystemen mit STEP, iVA, Techn. Univ. Braunschweig, 2002; http:\/\/www.iva.ing.tu-bs.de\/institut\/projekte\/Handout\\_STEP.pdf"},{"key":"2_CR37","unstructured":"Padberg, J. and Jansen, L. and Heckel, R. and Ehrig, H.: Interoperability in Train Control Systems: Specification of Scenarios Using Open Nets; in Proc. IDPT 1998 (Integrated De-sign and Process Technology), Berlin 1998, pages 17 - 28"},{"key":"2_CR38","unstructured":"Gary Rathwell: Stone Soup Development Methodology: Last updated December 5, 2000 http:\/\/www.pera.net\/Stonesoup.html"},{"key":"2_CR39","unstructured":"AUTOSAR (AUTomotive Open System ARchitecture); http:\/\/www.autosar.org\/"},{"key":"2_CR40","unstructured":"PLCopen; Molenstraat 34, 4201 CX Gorinchem, NL,: http:\/\/www.plcopen.org\/"},{"key":"2_CR41","unstructured":"UIC\/ERRI A200: ETCS, European Train Control System, Overall Project Declaration including the contribution to be made by UIC, Utrecht, NL, Jan. 1992"},{"key":"2_CR42","unstructured":"UIC\/ERRI A200: Brochure ETCS, European Train Control System, The new standard train control system for the European railways, Aug. 1993, 2nd. Rev. Oct. 1995"},{"key":"2_CR43","unstructured":"Johannes Feuser, Jan Peleska: Security in Open Model Software with Hardware Virtualization - The Railway Control System Perspective. Univ. Bremen, 2010 http:\/\/opencert.iist.unu.edu\/Papers\/2010-paper-2-B.pdf"}],"container-title":["FORMS\/FORMAT 2010"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14261-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T16:52:50Z","timestamp":1682095970000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-14261-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642142604","9783642142611"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14261-1_2","relation":{},"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"31 January 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}