{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:23:00Z","timestamp":1725790980250},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_43","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T06:15:38Z","timestamp":1395728138000},"page":"432-437","source":"Crossref","is-referenced-by-count":1,"title":["An Evaluation of Argument Patterns Based on Data Flow"],"prefix":"10.1007","author":[{"given":"Shuichiro","family":"Yamamoto","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"Kelly, T.P.: A Six-Step Method for the Development of Goal Structures. York Software Engineering (1997)"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Kelly, T.: Arguing Safety, a Systematic Approach to Managing Safety Cases, PhD thesis, Department of Computer Science, University of York (1998)","DOI":"10.1007\/3-540-48249-0_2"},{"key":"43_CR3","unstructured":"Jackson, D., et al.: Software for dependable systems\u2013sufficient evidence? National Research Council (2008)"},{"key":"43_CR4","unstructured":"European Organisation for the Safety of Air Navigation, Safety Case Development Manual, 2nd edn. EUROCONTROL (October 2006)"},{"key":"43_CR5","unstructured":"Despotou, G., Kelly, T.: Design and Development of Dependability Case Architecture during System Development. In: Proceedings of the 25th International System Safety Conference (ISSC). Proceedings by the System Safety Society, Baltimore (2007)"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Bloomfield, R., Bishop, P.: Safety and assurance cases: Past, present and possible future\u2013an Adelard perspective. In: Proceedings of 18th Safety-Critical Systems Symposium (February 2010)","DOI":"10.1007\/978-1-84996-086-1_4"},{"key":"43_CR7","unstructured":"Goodenough, J., Lipson, H., Weinstock, C.: Arguing Security - Creating Security Assurance Cases (2007), https:\/\/buildsecurityin.us-cert.gov\/bsi\/articles\/knowledge\/assurance\/643-BSI.html"},{"key":"43_CR8","unstructured":"Alexander, T., Hawkins, R., Kelly, T.: Security Assurance Cases: Motivation and the State of the Art. CESG\/TR\/2011 (2011)"},{"key":"43_CR9","unstructured":"Kaneko, T., Yamamoto, S., Tanaka, H.: Proposal on Countermeasure Decision Method Using Assurance Case and Common Criteria. In: ProMAC 2012 (2012)"},{"key":"43_CR10","unstructured":"Kaneko, T., Yamamoto, S., Tanaka, H.: SARM \u2013 a spiral review method for security requirements based on Actor Relationship Matrix. In: ProMAC 2010, pp. P1227\u2013P1238 (2010)"},{"key":"43_CR11","unstructured":"Kaneko, T., Yamamoto, S., Tanaka, H.: Specification of Whole Steps for the Security Requirements Analysis Method (SARM)-From Requirement Analysis to Countermeasure Decision. In: ProMAC 2011 (2011)"},{"key":"43_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/978-3-642-36818-9_36","volume-title":"Information and Communication Technology","author":"S. Yamamoto","year":"2013","unstructured":"Yamamoto, S., Kaneko, T., Tanaka, H.: A Proposal on Security Case based on Common Criteria. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 331\u2013336. Springer, Heidelberg (2013)"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Yamamoto, S., Matsuno, Y.: An Evaluation of Argument Patterns to Reduce Pitfalls of Applying Assurance Case. In: Assure 2013, pp. 12\u201317 (2013)","DOI":"10.1109\/ASSURE.2013.6614265"},{"key":"43_CR14","unstructured":"D-Case editor, http:\/\/www.dependable-os.net\/tech\/D-CaseEditor\/"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Takama, S., Patu, V., Matsuno, Y., Yamamoto, S.: A Proposal on a Method for Reviewing Operation Manuals of Supercomputer. In: ISSRE Workshops 2012, pp. 305\u2013306 (2012)","DOI":"10.1109\/ISSREW.2012.77"},{"key":"43_CR16","unstructured":"DEOS, http:\/\/www.jst.go.jp\/kisoken\/crest\/en\/research_area\/ongoing\/area04-4.html"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T23:07:00Z","timestamp":1648681620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}