{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:58:56Z","timestamp":1725746336809},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407925"},{"type":"electronic","value":"9783642407932"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40793-2_2","type":"book-chapter","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T02:10:59Z","timestamp":1377569459000},"page":"8-20","source":"Crossref","is-referenced-by-count":0,"title":["Comparative Conformance Cases for Monitoring Multiple Implementations of Critical Requirements"],"prefix":"10.1007","author":[{"given":"Janusz","family":"G\u00f3rski","sequence":"first","affiliation":[]},{"given":"Aleksander","family":"Jarz\u0119bowicz","sequence":"additional","affiliation":[]},{"given":"Jakub","family":"Miler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Study on Risk Governance of European Critical Infrastructures in the ICT and Energy Sector, Final Report, AEA Technology, ED05761 (2009)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"G\u00f3rski, J.: Trust Case \u2013 a case for trustworthiness of IT infrastructures. In: Cyberspace Security and Defense. NATO Science Series, vol. 196, pp. 125\u2013142. Springer (2005)","DOI":"10.1007\/1-4020-3381-8_7"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ress.2004.08.005","volume":"89","author":"J. G\u00f3rski","year":"2005","unstructured":"G\u00f3rski, J., Jarz\u0119bowicz, A., Leszczyna, R., Miler, J., Olszewski, M.: Trust case: justifying trust in IT solution. Reliability Engineering and System Safety\u00a089(1), 33\u201347 (2005)","journal-title":"Reliability Engineering and System Safety"},{"key":"2_CR4","unstructured":"Ministry of Defence, Defence Standard 00-56 Issue 4: Safety Management Requirements for Defence Systems (2007)"},{"issue":"3","key":"2_CR5","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1504\/IJCCBS.2012.050295","volume":"3","author":"T. Yuan","year":"2012","unstructured":"Yuan, T., Kelly, T.: Argument based approach to computer safety system engineering. Int. J. Critical Computer-Based Systems\u00a03(3), 151\u2013167 (2012)","journal-title":"Int. J. Critical Computer-Based Systems"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-15651-9_7","volume-title":"Computer Safety, Reliability, and Security","author":"R. Palin","year":"2010","unstructured":"Palin, R., Habli, I.: Assurance of automotive safety \u2013 A safety case approach. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol.\u00a06351, pp. 82\u201396. Springer, Heidelberg (2010)"},{"key":"2_CR7","unstructured":"ISO\/IEC 15026-2:2011: Systems and software engineering - Systems and software assurance - Part 2: Assurance case (2011)"},{"key":"2_CR8","unstructured":"G\u00f3rski, J.: Trust-IT \u2013 a framework for trust cases, Workshop on Assurance Cases for Security - The Metrics Challenge. In: Proc. of DSN 2007, Edinburgh, UK, pp. 204\u2013209 (2007)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Cyra, \u0141., G\u00f3rski, J.: Supporting Compliance with Safety Standards by Trust Case Templates. In: Proc. ESREL 2007, Stavanger, Norway, pp. 1367\u20131374 (2007)","DOI":"10.1109\/DEPCOS-RELCOMEX.2007.44"},{"key":"2_CR10","unstructured":"Toulmin, S.: The Uses of Argument. Cambridge University Press (1958)"},{"key":"2_CR11","unstructured":"Goal Structuring Notation community Standard version 1 (2011)"},{"key":"2_CR12","unstructured":"Adelard Safety Case Editor (ASCE) website, http:\/\/www.adelard.com\/asce\/"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Shafer G.: Mathematical Theory of Evidence. Princetown University Press (1976)","DOI":"10.1515\/9780691214696"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ress.2010.06.027","volume":"96","author":"\u0141. Cyra","year":"2011","unstructured":"Cyra, \u0141., G\u00f3rski, J.: Support for argument structures review and assessment. Reliability Engineering and System Safety\u00a096, 26\u201337 (2011)","journal-title":"Reliability Engineering and System Safety"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-33675-1_39","volume-title":"Computer Safety, Reliability, and Security","author":"J. G\u00f3rski","year":"2012","unstructured":"G\u00f3rski, J., Jarz\u0119bowicz, A., Miler, J., Witkowicz, M., Czy\u017cnikiewicz, J., Jar, P.: Supporting Assurance by Evidence-Based Argument Services. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP Workshops 2012. LNCS, vol.\u00a07613, pp. 417\u2013426. Springer, Heidelberg (2012)"},{"key":"2_CR16","unstructured":"Proceedings of the Workshop on Selected Problems in Environmental Risk Management and Emerging Threats, Gdansk, Poland (June 2009), http:\/\/kio.pg.gda.pl\/ERM2009\/"},{"issue":"2","key":"2_CR17","doi-asserted-by":"crossref","first-page":"269","DOI":"10.2478\/v10178-012-0023-x","volume":"XIX","author":"J. G\u00f3rski","year":"2012","unstructured":"G\u00f3rski, J., Jarz\u0119bowicz, A., Miler, J.: Validation of services supporting healthcare standards conformance. Metrology and Measurements Systems\u00a0XIX(2), 269\u2013282 (2012)","journal-title":"Metrology and Measurements Systems"},{"key":"2_CR18","unstructured":"Regulation (EU) No\u00a0994\/2010 of the European Parliament and of the Council of 20\u00a0October 2010 concerning measures to safeguard security of gas supply and repealing Council Directive 2004\/67\/EC (2010)"},{"key":"2_CR19","unstructured":"European Institute of Public Administration, CAF-Common Assessment Framework (2012), http:\/\/www.eipa.eu\/en\/topic\/show\/&tid=191"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40793-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T22:28:11Z","timestamp":1646432891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40793-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407925","9783642407932"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40793-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}