{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:53:28Z","timestamp":1776441208136,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642336744","type":"print"},{"value":"9783642336751","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33675-1_7","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T16:33:04Z","timestamp":1347294784000},"page":"79-91","source":"Crossref","is-referenced-by-count":13,"title":["A New Approach to Assessment of Confidence in Assurance Cases"],"prefix":"10.1007","author":[{"given":"Xingyu","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Dajian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Minyan","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Fuping","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Weinstock, C.B., Goodenough, J.B.: Towards an Assurance Case Practice for Medical Devices. CMU\/SEI-2009-TN-018 (2009)"},{"issue":"2","key":"7_CR2","doi-asserted-by":"crossref","first-page":"89","DOI":"10.22329\/il.v31i2.2965","volume":"31","author":"T. Yuan","year":"2011","unstructured":"Yuan, T., Kelly, T.: Argument Schemes in Computer System Safety Engineering. Informal Logic\u00a031(2), 89\u2013109 (2011)","journal-title":"Informal Logic"},{"key":"7_CR3","unstructured":"Goodenough, J.B., Weinstock, C.B., Klein, A.Z.: Assessing Confidence in an Assurance Case. CMU\/SEI-2011-TR-Draft (2011)"},{"key":"7_CR4","unstructured":"Argumentation Metamodel (ARM). OMG Document Number: ptc\/2010-08-36. Standard document (2010), http:\/\/www.omg.org\/spec\/ARM"},{"key":"7_CR5","unstructured":"Toulmin, S.: The Uses of Argument. Cambridge University Press (1958)"},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10503-005-4422-y","volume":"19","author":"D. Hitchcock","year":"2005","unstructured":"Hitchcock, D.: Good Reasoning on the Toulmin Model. Argumentation\u00a019(3), 373\u2013391 (2005)","journal-title":"Argumentation"},{"key":"7_CR7","unstructured":"ISO\/IEC TR 15026-1:2010, Systems and Software Engineering - Systems and Software Assurance \u2013 Part 1: Concepts and Vocabulary (2010)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Bishop, P.: Safety and Assurance Cases: Past, Present and Possible Future - an Adelard Perspective. In: Making Systems Safer, pp. 51\u201367 (2010)","DOI":"10.1007\/978-1-84996-086-1_4"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Littlewood, B., Wright, D.: Confidence: Its Role in Dependability Cases for Risk Assessment. In: International Conference on Dependable Systems and Networks, Edinburgh, pp. 338\u2013346 (2007)","DOI":"10.1109\/DSN.2007.29"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Littlewood, B.: Multi-legged Arguments: the Impact of Diversity Upon Confidence in Dependability Arguments. In: International Conference on Dependable Systems and Networks (DSN 2003), pp. 25\u201334 (2003)","DOI":"10.1109\/DSN.2003.1209913"},{"issue":"5","key":"7_CR11","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TSE.2007.1002","volume":"33","author":"B. Littlewood","year":"2007","unstructured":"Littlewood, B., Wright, D.: The Use of Multilegged Arguments to Increase Confidence in Safety Claims for Software-based Systems: A Study Based on a BBN Analysis of an Idealized Example. IEEE Trans. Soft. Eng.\u00a033(5), 347\u2013365 (2007)","journal-title":"IEEE Trans. Soft. Eng."},{"issue":"5","key":"7_CR12","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/TSE.2010.67","volume":"37","author":"P. Bishop","year":"2011","unstructured":"Bishop, P., Bloomfield, R., Littlewood, B., Povyakalo, A., Wright, D.: Towards a Formalism for Conservative Claims about the Dependability of Software-based Systems. IEEE Trans. Soft. Eng.\u00a037(5), 708\u2013717 (2011)","journal-title":"IEEE Trans. Soft. Eng."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Denney, E., Pai, G., Habli, I.: Towards Measurement of Confidence in Safety Cases. In: 2011 International Symposium on Empirical Software Engineering and Measurement, pp. 380\u2013383 (2011)","DOI":"10.1109\/ESEM.2011.53"},{"key":"7_CR14","unstructured":"Bloomfield, R., Bishop, P., Jones, C., Froome, P.: ASCAD-Adelard Safety Case Development Manual. Adelard (1998) ISBN 0953377105"},{"key":"7_CR15","unstructured":"Kelly, T.: Arguing safety-a systematic approach to managing safety cases. York, University of York. PhD thesis (1998)"},{"key":"7_CR16","unstructured":"G\u00f3rski, J.: Trust-IT - a Framework for Trust Cases. In: Workshop on Assurance Cases for Security - The Metrics Challenge, DSN 2007, Edinburgh, UK (2007)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Hawkins, R., Kelly, T., Knight, J., Graydon, P.: A New Approach to Creating Clear Safety Arguments. In: Safety Critical Systems Symp. (2011)","DOI":"10.1007\/978-0-85729-133-2_1"},{"key":"7_CR18","unstructured":"Leveson, N.: The Use of Safety Cases in Certification and Regulation. Journal of System Safety\u00a047(6) (2011)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Hobbs, C., Lloyd, M.: The Application of Bayesian Belief Networks to Assurance Case Preparation. In: Achieving Systems Safety, pp. 159\u2013176 (2012)","DOI":"10.1007\/978-1-4471-2494-8_12"},{"key":"7_CR20","unstructured":"Sun, L., Zhang, W., Kelly, T.: Do Safety Cases Have a Role in Aerospace Certification? In: 2nd International Symposium on Aircraft Airworthiness, Beijing, China (2011)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33675-1_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:28:44Z","timestamp":1744086524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33675-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336744","9783642336751"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33675-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}