{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T17:47:11Z","timestamp":1743875231704},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336744"},{"type":"electronic","value":"9783642336751"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33675-1_39","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:33:04Z","timestamp":1347280384000},"page":"417-426","source":"Crossref","is-referenced-by-count":10,"title":["Supporting Assurance by Evidence-Based Argument Services"],"prefix":"10.1007","author":[{"given":"Janusz","family":"G\u00f3rski","sequence":"first","affiliation":[]},{"given":"Aleksander","family":"Jarz\u0119bowicz","sequence":"additional","affiliation":[]},{"given":"Jakub","family":"Miler","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Witkowicz","sequence":"additional","affiliation":[]},{"given":"Jakub","family":"Czy\u017cnikiewicz","sequence":"additional","affiliation":[]},{"given":"Patryk","family":"Jar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Ministry of Defence, Defence Standard 00-56 Issue 4: Safety Management Requirements for Defence Systems (2007)"},{"key":"39_CR2","volume-title":"Proceedings of the 2005 Automated Software Engineering Workshop on Software Certificate Management, SoftCeMent 2005","author":"L. Emmet","year":"2005","unstructured":"Emmet, L., Guerra, S.: Application of a Commercial Assurance Case Tool to Support Software Certification Services. In: Proceedings of the 2005 Automated Software Engineering Workshop on Software Certificate Management, SoftCeMent 2005. ACM, New York (2005)"},{"key":"39_CR3","unstructured":"Kelly, T., Weaver, R.: The Goal Structuring Notation - A Safety Argument Notation. In: Proceedings of the Dependable Systems and Networks Workshop on Assurance Cases (2004)"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Rhodes, T., Boland, F., Fong, E., Kass, M.: Software Assurance Using Structured Assurance Case Models, NIST Interagency Report 7608, US Department of Commerce (2009)","DOI":"10.6028\/NIST.IR.7608"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"G\u00f3rski, J.: Trust Case \u2013 a case for trustworthiness of IT infrastructures. In: Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry, vol.\u00a0196, pp. 125\u2013142. Springer (2005)","DOI":"10.1007\/1-4020-3381-8_7"},{"key":"39_CR6","unstructured":"Toulmin, S.: The Uses of Argument. Cambridge University Press (1958)"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ress.2010.06.027","volume":"96","author":"\u0141. Cyra","year":"2011","unstructured":"Cyra, \u0141., G\u00f3rski, J.: Support for argument structures review and assessment. Reliability Engineering and System Safety\u00a096, 26\u201337 (2011)","journal-title":"Reliability Engineering and System Safety"},{"issue":"2","key":"39_CR8","doi-asserted-by":"publisher","first-page":"269","DOI":"10.2478\/v10178-012-0023-x","volume":"19","author":"J. G\u00f3rski","year":"2012","unstructured":"G\u00f3rski, J., Jarz\u0119bowicz, A., Miler, J.: Validation of services supporting healthcare standards conformance. Metrology and Measurements Systems\u00a019(2), 269\u2013282 (2012)","journal-title":"Metrology and Measurements Systems"},{"key":"39_CR9","unstructured":"ASCE home page, http:\/\/www.adelard.com\/asce\/ (visited June 27, 2012)"},{"key":"39_CR10","unstructured":"ISCaDE home page, http:\/\/www.iscade.co.uk\/ (visited June 27, 2012)"},{"key":"39_CR11","unstructured":"GSN add-on for Visio home page, http:\/\/www-users.cs.york.ac.uk\/~tpk\/gsn\/ (visited June 27, 2012)"},{"key":"39_CR12","unstructured":"Steele, P., Collins, K., Knight, J.: ACCESS: A Toolset for Safety Case Creation and Management. In: Proc. of 29th International Systems Safety Conference, Las Vegas, NV (2011)"},{"key":"39_CR13","unstructured":"G\u00f3rski, J.: Trust-IT \u2013 a framework for trust cases. In: Workshop on Assurance Cases for Security - The Metrics Challenge, Proc. of DSN 2007, Edinburgh, UK, pp. 204\u2013209 (2007)"},{"issue":"1","key":"39_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ress.2004.08.005","volume":"89","author":"J. G\u00f3rski","year":"2005","unstructured":"G\u00f3rski, J., Jarzebowicz, A., Leszczyna, R., Miler, J., Olszewski, M.: Trust case: justifying trust in IT solution. Reliability Engineering and System Safety\u00a089(1), 33\u201347 (2005)","journal-title":"Reliability Engineering and System Safety"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Shafer, G.: Mathematical Theory of Evidence. Princeton University Press (1976)","DOI":"10.1515\/9780691214696"},{"issue":"1","key":"39_CR16","first-page":"51","volume":"5","author":"J. G\u00f3rski","year":"2011","unstructured":"G\u00f3rski, J., Witkowicz, M.: Experience with instantiating an automated testing process in the context of incremental and evolutionary software development. E-informatica: Software Engineering Journal\u00a05(1), 51\u201363 (2011)","journal-title":"E-informatica: Software Engineering Journal"},{"key":"39_CR17","unstructured":"G\u00f3rski, J., Jarz\u0119bowicz, A., Miler, J., Go\u0142aszewski, G., Cyra, \u0141., Witkowicz, M.: Deliverable D5.4: Trust Case for ANGEL platform demonstrator, ANGEL STREP Project deliverable, project no. IST-5-033506-STP (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33675-1_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T11:04:41Z","timestamp":1643367881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33675-1_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336744","9783642336751"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33675-1_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}