{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:43:16Z","timestamp":1761975796835,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407925"},{"type":"electronic","value":"9783642407932"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40793-2_16","type":"book-chapter","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T02:10:59Z","timestamp":1377569459000},"page":"166-177","source":"Crossref","is-referenced-by-count":17,"title":["Structuring Safety Requirements in ISO 26262 Using Contract Theory"],"prefix":"10.1007","author":[{"given":"Jonas","family":"Westman","sequence":"first","affiliation":[]},{"given":"Mattias","family":"Nyberg","sequence":"additional","affiliation":[]},{"given":"Martin","family":"T\u00f6rngren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"ISO: 26262 - Road vehicles-Functional safety (2011)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-92188-2_9","volume-title":"Formal Methods for Components and Objects","author":"A. Benveniste","year":"2008","unstructured":"Benveniste, A., Caillaud, B., Ferrari, A., Mangeruca, L., Passerone, R., Sofronis, C.: Multiple Viewpoint Contract-Based Specification and Design. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2007. LNCS, vol.\u00a05382, pp. 200\u2013225. Springer, Heidelberg (2008)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-24270-0_5","volume-title":"Computer Safety, Reliability, and Security","author":"J.-P. Blanquart","year":"2011","unstructured":"Blanquart, J.-P., et al.: Towards Cross-Domains Model-Based Safety Process, Methods and Tools for Critical Embedded Systems: The CESAR Approach. In: Flammini, F., Bologna, S., Vittorini, V. (eds.) SAFECOMP 2011. LNCS, vol.\u00a06894, pp. 57\u201370. Springer, Heidelberg (2011)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-16256-5_8","volume-title":"Software Technologies for Embedded and Ubiquitous Systems","author":"A. Baumgart","year":"2010","unstructured":"Baumgart, A., Reinkemeier, P., Rettberg, A., Stierand, I., Thaden, E., Weber, R.: A Model\u2013Based Design Methodology with Contracts to Enhance the Development Process of Safety\u2013Critical Systems. In: Min, S.L., Pettit, R., Puschner, P., Ungerer, T. (eds.) SEUS 2010. LNCS, vol.\u00a06399, pp. 59\u201370. Springer, Heidelberg (2010)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Damm, W., Josko, B., Peinkamp, T.: Contract Based ISO CD 26262 Safety Analysis. In: Safety-Critical Systems, SAE (2009)","DOI":"10.4271\/2009-01-0754"},{"issue":"3","key":"16_CR6","doi-asserted-by":"publisher","first-page":"217","DOI":"10.3166\/ejc.18.217-238","volume":"18","author":"A.L. Sangiovanni-Vincentelli","year":"2012","unstructured":"Sangiovanni-Vincentelli, A.L., Damm, W., Passerone, R.: Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems. Eur. J. Control\u00a018(3), 217\u2013238 (2012)","journal-title":"Eur. J. Control"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Benveniste, A., Caillaud, B., Passerone, R.: Multi-Viewpoint State Machines for Rich Component Models (2008)","DOI":"10.1201\/9781420067859-c15"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Graf, S., Quinton, S.: Contracts for BIP: Hierarchical Interaction Models for Compositional verification (2007)","DOI":"10.1007\/978-3-540-73196-2_1"},{"key":"16_CR9","unstructured":"Benveniste, A., et al.: Contracts for the Design of Embedded Systems. Part II: Theory (March 2013), http:\/\/www.irisa.fr\/distribcom\/benveniste\/pub\/"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B. Meyer","year":"1992","unstructured":"Meyer, B.: Applying \u201cDesign by Contract\u201d. IEEE Computer\u00a025, 40\u201351 (1992)","journal-title":"IEEE Computer"},{"issue":"10","key":"16_CR11","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1145\/363235.363259","volume":"12","author":"C.A.R. Hoare","year":"1969","unstructured":"Hoare, C.A.R.: An Axiomatic Basis for Computer Programming. Commun. ACM\u00a012(10), 576\u2013580 (1969)","journal-title":"Commun. ACM"},{"issue":"8","key":"16_CR12","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1145\/360933.360975","volume":"18","author":"E.W. Dijkstra","year":"1975","unstructured":"Dijkstra, E.W.: Guarded Commands, Nondeterminacy and Formal Derivation of Programs. Commun. ACM\u00a018(8), 453\u2013457 (1975)","journal-title":"Commun. ACM"},{"key":"16_CR13","unstructured":"Giese, H.: Contract-based Component System Design. In: Thirty-Third Annual Hawaii Int. Conf. on System Sciences (HICSS-33). IEEE Press, Maui (2000)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Sun, X., et al.: Contract-based System-Level Composition of Analog Circuits. In: 46th ACM\/IEEE Design Automation Conf., DAC 2009, pp. 605\u2013610 (July 2009)","DOI":"10.1145\/1629911.1630066"},{"key":"16_CR15","unstructured":"Damm, W.: Controlling Speculative Design Processes Using Rich Component Models. In: Fifth International Conference on Application of Concurrency to System Design, ACSD 2005, pp. 118\u2013119 (June 2005)"},{"key":"16_CR16","unstructured":"Back, R.-J., Wright, J.V.: Contracts, Games and Refinement. In: Information and Computation, p. 200\u20130. Elsevier (1997)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Alfaro, L.D., Henzinger, T.A.: Interface Theories for Component-based Design, pp. 148\u2013165. Springer (2001)","DOI":"10.1007\/3-540-45449-7_11"},{"key":"16_CR18","doi-asserted-by":"crossref","first-page":"51","DOI":"10.7551\/mitpress\/1102.003.0006","volume-title":"Proceedings of the Fifth MIT Conference on Advanced Research in VLSI","author":"D.L. Dill","year":"1988","unstructured":"Dill, D.L.: Trace Theory for Automatic Hierarchical Verification of Speed-Independent Circuits. In: Proceedings of the Fifth MIT Conference on Advanced Research in VLSI, pp. 51\u201365. MIT Press, Cambridge (1988)"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-44618-4_16","volume-title":"CONCUR 2000 - Concurrency Theory","author":"R. Negulescu","year":"2000","unstructured":"Negulescu, R.: Process spaces. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, pp. 199\u2013213. Springer, Heidelberg (2000)"},{"issue":"6","key":"16_CR20","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1145\/362384.362685","volume":"13","author":"E.F. Codd","year":"1970","unstructured":"Codd, E.F.: A Relational Model of Data for Large Shared Data Banks. Commun. ACM\u00a013(6), 377\u2013387 (1970)","journal-title":"Commun. ACM"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Westman, J., Nyberg, M., T\u00f6rngren, M.: Structuring Safety Requirements in ISO 26262 using Contract Theory. Technical Report TRITA MMK 2013:04, KTH (March 2012)","DOI":"10.1007\/978-3-642-40793-2_16"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40793-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T14:12:43Z","timestamp":1746022363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40793-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407925","9783642407932"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40793-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}