{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:03:06Z","timestamp":1754485386984},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336744"},{"type":"electronic","value":"9783642336751"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33675-1_27","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T16:33:04Z","timestamp":1347294784000},"page":"307-318","source":"Crossref","is-referenced-by-count":12,"title":["Formal Verification of a Safety Argumentation and Application to a Complex UAV System"],"prefix":"10.1007","author":[{"given":"Julien","family":"Brunel","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Cazin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Bishop, P., Bloomfield, R.: A Methodology for Safety Case Development. In: The Sixth Safety-critical Systems Symposium, Birmingham, UK (1998)","DOI":"10.1007\/978-1-4471-1534-2_14"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"R. Bresciani","year":"2004","unstructured":"Bresciani, R., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems\u00a08, 203\u2013236 (2004)","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"27_CR3","unstructured":"Cavada, R., Cimatti, A., Jochim, C.A., Keighren, G., Olivetti, E., Pistore, M., Roveri, M., Tchaltsev, A.: NuSMV User Manual. FBK-irst (2006), \n                    \n                      http:\/\/nusmv.fbk.eu\/NuSMV"},{"key":"27_CR4","unstructured":"Safety case development manual. Technical Report, Eurocontrol, DAP\/SSH\/091 (2006)"},{"key":"27_CR5","unstructured":"The Goal Structuring Notation Website - University of York, \n                    \n                      http:\/\/www.goalstructuringnotation.info"},{"key":"27_CR6","unstructured":"Kelly, T., Weaver, R.: The Goal Structuring Notation \u2013 A Safety Argument Notation. In: Dependable Systems and Networks 2004 Workshop on Assurance (2004)"},{"key":"27_CR7","unstructured":"van Lamswerde, A.: Requirements engineering, From System Goals to UML Models to Software Specifications. Wiley (2009)"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Letier, E., Kramer, J., Magee, J., Uchitel, S.: Fluent Temporal Logic for Discrete-Time Event-Based Models. In: ESEC\/FSE 2005 - 5th Joint Meeting of the the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2005)","DOI":"10.1145\/1095430.1081719"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Letier, E., van Lamsweerde, A.: Deriving Operational Software Specifications from System Goals. In: FSE 2002 - 10th International Symposium on the Foundation of Software Engineering (2002)","DOI":"10.1145\/587051.587070"},{"key":"27_CR10","unstructured":"Morge, M., Mancarella, P.: Mod\u00e8le d\u2019argumentation concret pour le raisonnement pratique. Actes des Journ\u00e9es Francophones Planification D\u00e9cision Apprentissage pour la Conduite des Syst\u00e8mes, JFPDA 2007 (2007)"},{"key":"27_CR11","unstructured":"Objectiver, a power tool to engineer your Technical and Business Requirements, \n                    \n                      http:\/\/www.objectiver.com"},{"key":"27_CR12","unstructured":"Rifaut, A., Massonet, P., Molderez, J.-F., Ponsard, C., Stadnik, P., van Lamsweerde, A., Van Hung, T.: FAUST: formal analysis using specification tools. In: Proceedings of 11th IEEE International Requirements Engineering Conference (2003)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Rushby, J.: A safety-case approach for certifying adaptive systems. In: AIAA Infotech@Aerospace Conference (2009)","DOI":"10.2514\/6.2009-1992"},{"key":"27_CR14","unstructured":"Toulmin, S.: The Uses of Argument. Cambridge University Press (1969)"},{"key":"27_CR15","unstructured":"Toussaint, B.: Safety analysis of a U.A.V helicopter, by modelling, simulation, and formal methods. Master\u2019s thesis, ONERA\/ISAE (2010)"},{"key":"27_CR16","unstructured":"Weaver, R., Fenn, J., Kelly, T.: A pragmatic approach to reasoning about the assurance of safety arguments. In: 8th Australian Workshop on Safety Critical Systems and Software, SCS 2003 (2003)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33675-1_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:18:27Z","timestamp":1620130707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33675-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336744","9783642336751"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33675-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}