{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:49:15Z","timestamp":1769734155791,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642407925","type":"print"},{"value":"9783642407932","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40793-2_1","type":"book-chapter","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T02:10:59Z","timestamp":1377569459000},"page":"1-7","source":"Crossref","is-referenced-by-count":13,"title":["Logic and Epistemology in Safety Cases"],"prefix":"10.1007","author":[{"given":"John","family":"Rushby","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Requirements and Technical Concepts for Aviation (RTCA) Washington, DC: DO-178C: Software Considerations in Airborne Systems and Equipment Certification (2011)"},{"key":"1_CR2","unstructured":"Haddon-Cave, C.: The Nimrod Review: An independent review into the broader issues surrounding the loss of the RAF Nimrod MR2 Aircraft XV230 in Afghanistan in 2006. Report, The Stationery Office, London, UK (2009), \n                    \n                      http:\/\/www.official-documents.gov.uk\/document\/hc0809\/hc10\/1025\/1025.pdf"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., et al.: seL4: Formal verification of an OS kernel. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 207\u2013220. ACM (2009)","DOI":"10.1145\/1629575.1629596"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-30206-3_13","volume-title":"Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems","author":"P. Miner","year":"2004","unstructured":"Miner, P., Geser, A., Pike, L., Maddalon, J.: A unified fault-tolerance protocol. In: Lakhnech, Y., Yovine, S. (eds.) FORMATS\/FTRTFT 2004. LNCS, vol.\u00a03253, pp. 167\u2013182. Springer, Heidelberg (2004)"},{"key":"1_CR5","first-page":"209","volume":"17","author":"A. Narkawicz","year":"2012","unstructured":"Narkawicz, A., Mu\u00f1oz, C.: Formal verification of conflict detection algorithms for arbitrary trajectories. Reliable Computing\u00a017, 209\u2013237 (2012)","journal-title":"Reliable Computing"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1109\/TSE.2011.80","volume":"38","author":"B. Littlewood","year":"2012","unstructured":"Littlewood, B., Rushby, J.: Reasoning about the reliability of diverse two-channel systems in which one channel is \u201cpossibly perfect\u201d. IEEE Transactions on Software Engineering\u00a038, 1178\u20131194 (2012)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1_CR7","unstructured":"Society of Automotive Engineers: Aerospace Recommended Practice (ARP) 4761: Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment (1996)"},{"key":"1_CR8","unstructured":"Society of Automotive Engineers: Aerospace Recommended Practice (ARP) 4754: Certification Considerations for Highly-Integrated or Complex Aircraft Systems (1996), Also issued as EUROCAE ED-79; revised as ARP 4754A (December 2010)"},{"key":"1_CR9","unstructured":"Requirements and Technical Concepts for Aviation (RTCA) Washington, DC: DO-178B: Software Considerations in Airborne Systems and Equipment Certification (1992), This document is known as EUROCAE ED-12B in Europe"},{"key":"1_CR10","unstructured":"Rushby, J.: The Ontological Argument in PVS. In: Shilov, N. (ed.) Fun With Formal Methods, St Petersburg, Russia (2013), Workshop in association with CAV 2013"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Rushby, J.: Formalism in safety cases. In: Dale, C., Anderson, T. (eds.) Making Systems Safer: Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, UK, pp. 3\u201317. Springer (2010)","DOI":"10.1007\/978-1-84996-086-1_1"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-642-35873-9_18","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S. Cruanes","year":"2013","unstructured":"Cruanes, S., Hamon, G., Owre, S., Shankar, N.: Tool Integration with the Evidential Tool Bus. In: Giacobazzi, R., Berdine, J., Mastroeni, I. (eds.) VMCAI 2013. LNCS, vol.\u00a07737, pp. 275\u2013294. Springer, Heidelberg (2013)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Toulmin, S.E.: The Uses of Argument, Updated edition. Cambridge University Press (2003) (the original is dated 1958)","DOI":"10.1017\/CBO9780511840005"},{"key":"1_CR14","unstructured":"Bishop, P., Bloomfield, R., Guerra, S.: The future of goal-based assurance cases. In: DSN Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities, Florence, Italy (2004)"},{"key":"1_CR15","unstructured":"Pritchett, A.R., Feigh, K.M., Kim, S.Y., Kannan, S.: Work Models that Compute to support the design of multi-agent socio-technical systems. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans (under review)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Bolton, M.L., Bass, E.J.: Evaluating human-automation interaction using task analytic behavior models, strategic knowledge-based erroneous human behavior generation, and model checking. In: IEEE International Conference on Systems, Man, and Cybernetics, Anchorage, AK, pp. 1788\u20131794 (2011)","DOI":"10.1109\/ICSMC.2011.6083931"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1646353.1646372","volume":"53","author":"S.P. Miller","year":"2010","unstructured":"Miller, S.P., Whalen, M.W., Cofer, D.D.: Software model checking takes off. Communications of the ACM\u00a053, 58\u201364 (2010)","journal-title":"Communications of the ACM"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Rushby, J.: A safety-case approach for certifying adaptive systems. In: AIAA Infotech@Aerospace Conference, Seattle, WA, American Institute of Aeronautics and Astronautics (2009) AIAA paper 2009-1992","DOI":"10.2514\/6.2009-1992"},{"key":"1_CR19","unstructured":"Bass, E.J., Feigh, K.M., Gunter, E., Rushby, J.: Formal modeling and analysis for interactive hybrid systems. In: Fourth International Workshop on Formal Methods for Interactive Systems: FMIS 2011, Limerick, Ireland. Electronic Communications of the EASST, vol.\u00a045 (2011)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Rushby, J.: New challenges in certification for aircraft software. In: Baruah, S., Fischmeister, S. (eds.) Proceedings of the Ninth ACM International Conference on Embedded Software: EMSOFT, Taipei, Taiwan, pp. 211\u2013218. Association for Computing Machinery (2011)","DOI":"10.1145\/2038642.2038675"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40793-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T23:17:37Z","timestamp":1558048657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40793-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407925","9783642407932"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40793-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}