{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:01:10Z","timestamp":1743084070475,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642242694"},{"type":"electronic","value":"9783642242700"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24270-0_3","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T14:51:44Z","timestamp":1315407104000},"page":"29-42","source":"Crossref","is-referenced-by-count":17,"title":["Vertical Safety Interfaces \u2013 Improving the Efficiency of Modular Certification"],"prefix":"10.1007","author":[{"given":"Bastian","family":"Zimmer","sequence":"first","affiliation":[]},{"given":"Susanne","family":"B\u00fcrklen","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Knoop","sequence":"additional","affiliation":[]},{"given":"Jens","family":"H\u00f6fflinger","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Trapp","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Website of ifm electronics, http:\/\/www.ifm.com\/"},{"key":"3_CR2","unstructured":"Website of the autosar standard, http:\/\/www.autosar.org\/"},{"key":"3_CR3","unstructured":"ARINC: Arinc 653, avionic application software standard interface, part 1 (2005)"},{"key":"3_CR4","unstructured":"Bate, I., Hawkins, R., McDermid, J.: A contract-based approach to designing safe systems. In: Proceedings of the 8th Australian Workshop on Safety-Critical Systems and Software (SCS 2003), pp. 25\u201336 (2003)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/3-540-45732-1_31","volume-title":"Computer Safety, Reliability and Security","author":"I. Bate","year":"2002","unstructured":"Bate, I., Kelly, T.: Architectural considerations in the certification of modular systems. In: Anderson, S., Bologna, S., Felici, M. (eds.) SAFECOMP 2002. LNCS, vol.\u00a02434, pp. 321\u2013324. Springer, Heidelberg (2002)"},{"key":"3_CR6","first-page":"13","volume-title":"Proceedings of the 6th Australian Workshop on Safety Critical Systems and Software (SCS 2001)","author":"P. Conmy","year":"2001","unstructured":"Conmy, P., McDermid, J.: High level failure analysis for integrated modular avionics. In: Proceedings of the 6th Australian Workshop on Safety Critical Systems and Software (SCS 2001), pp. 13\u201322. ACM, New York (2001)"},{"key":"3_CR7","unstructured":"Conmy, P., Nicholson, M., McDermid, J.: Safety assurance contracts for integrated modular avionics. In: Proceedings of the 8th Australian Workshop on Safety-Critical Systems and Software (SCS 2003), pp. 69\u201378 (2003)"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/MOMPES.2007.4","volume-title":"Proceedings of the Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2007)","author":"P. Conmy","year":"2007","unstructured":"Conmy, P., Paige, R.: Challenges when using model driven architecture in the development of safety critical software. In: Proceedings of the Fourth International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2007), pp. 127\u2013136. IEEE, Los Alamitos (2007)"},{"key":"3_CR9","unstructured":"Damm, W., Metzner, A., Peikenkamp, T., Votintseva, A.: Boosting re-use of embedded automative applications through rich components. In: Proceedings of the Workshop on Foundations of Interface Technologies 2005, FIT 2005 (2005)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-540-87698-4_8","volume-title":"Computer Safety, Reliability, and Security","author":"D. Domis","year":"2008","unstructured":"Domis, D., Trapp, M.: Integrating safety analyses and component-based design. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol.\u00a05219, pp. 58\u201371. Springer, Heidelberg (2008)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Fenn, J., Hawkins, R., Williams, P., Kelly, T.: Safety case composition using contracts - refinements based on feedback from an industrial case study. In: Proceedings of the 15th Safety Critical Systems Symposium (SSS 2007). Springer, Heidelberg (2007)","DOI":"10.1007\/978-1-84628-806-7_9"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/11921998_17","volume-title":"Quality of Software Architectures","author":"L. Grunske","year":"2006","unstructured":"Grunske, L.: Towards an integration of standard component-based safety evaluation techniques with saveccm. In: Hofmeister, C., Crnkovi\u0107, I., Reussner, R. (eds.) QoSA 2006. LNCS, vol.\u00a04214, pp. 199\u2013213. Springer, Heidelberg (2006)"},{"issue":"4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1145\/69575.69577","volume":"5","author":"C.B. Jones","year":"1983","unstructured":"Jones, C.B.: Tentative steps toward a development method for interfering programs. ACM Trans on Programming Languages and Systems\u00a05(4), 596\u2013619 (1983)","journal-title":"ACM Trans on Programming Languages and Systems"},{"key":"3_CR14","volume-title":"Proceedings of the Dependable Systems and Networks Conference 2004 (DSN 2004)","author":"T. Kelly","year":"2004","unstructured":"Kelly, T., Weaver, R.: The goal structuring notation \u2013 a safety argument notation. In: Proceedings of the Dependable Systems and Networks Conference 2004 (DSN 2004). IEEE, Los Alamitos (2004)"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/CMPASS.1994.318470","volume-title":"Proceedings of the 9th Annual Conference on Computer Assurance (COMPASS 1994)","author":"J. McDermid","year":"1994","unstructured":"McDermid, J., Pumfrey, D.: A development of hazard analysis to aid software design. In: Proceedings of the 9th Annual Conference on Computer Assurance (COMPASS 1994), pp. 17\u201325. IEEE, Los Alamitos (1994)"},{"issue":"10","key":"3_CR16","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B. Meyer","year":"1992","unstructured":"Meyer, B.: Applying \u201ddesign by contract\u201d. IEEE Computer\u00a025(10), 40\u201351 (1992)","journal-title":"IEEE Computer"},{"issue":"71","key":"3_CR17","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0951-8320(00)00076-4","volume":"3","author":"Y. Papadopoulos","year":"2001","unstructured":"Papadopoulos, Y., McDermid, J., Sasse, R., Heiner, G.: Analysis and synthesis of the behaviour of complex programmable electronic systems in conditions of failure. Elsevier - Reliability Engineering & System Safety\u00a03(71), 229\u2013247 (2001)","journal-title":"Elsevier - Reliability Engineering & System Safety"},{"key":"3_CR18","unstructured":"Rushby, J.: Partitioning in avionics architectures: Requirements, mechanisms and assurance (1999)"},{"key":"3_CR19","unstructured":"Rushby, J.: Modular certification (2001)"},{"key":"3_CR20","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/1772643.1772660","volume-title":"Proceedings of the 1st Workshop on Critical Automotive Applications: Robustness & Safety, CARS 2010","author":"D. Schneider","year":"2010","unstructured":"Schneider, D., Trapp, M.: Conditional safety certificates in open systems. In: Proceedings of the 1st Workshop on Critical Automotive Applications: Robustness & Safety, CARS 2010, pp. 57\u201360. ACM, New York (2010)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24270-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T19:05:41Z","timestamp":1638558341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24270-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642242694","9783642242700"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24270-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}