{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:46:19Z","timestamp":1771703179243,"version":"3.50.1"},"reference-count":27,"publisher":"Elsevier","isbn-type":[{"value":"9780120121663","type":"print"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1016\/s0065-2458(05)66003-2","type":"book-chapter","created":{"date-parts":[[2011,1,19]],"date-time":"2011-01-19T00:56:21Z","timestamp":1295398581000},"page":"79-141","source":"Crossref","is-referenced-by-count":2,"title":["Requirements Management for Dependable Software Systems"],"prefix":"10.1016","author":[{"given":"William G.","family":"Bail","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0065-2458(05)66003-2_bb0010","series-title":"IARP\/IEEE-RAS Workshop on Robot Dependability: Technological Challenge of Dependable Robots on Human Environments","article-title":"Fundamental concepts of computer system dependability","author":"Avi\u017eienis","year":"2001"},{"key":"10.1016\/S0065-2458(05)66003-2_rf0015","series-title":"High dependability computing program","author":"Basili","year":"2004"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0020","series-title":"Final Report for the NASA Office of Safety and Mission Assurance, Software Assurance Research Program","article-title":"The use of a virtual system simulator and executable specifications to enhance software validation, verification, and safety assurance","volume":"583","author":"Bennett","year":"2004"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0025","series-title":"Software Engineering Economics","author":"Boehm","year":"1981"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0030","series-title":"IEEE Computer","article-title":"Software defect reduction top 10 list","author":"Boehm","year":"2001"},{"issue":"3","key":"10.1016\/S0065-2458(05)66003-2_bb0035","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MS.2004.1293073","article-title":"The ROI of software dependability: The iDave model","volume":"12","author":"Boehm","year":"2004","journal-title":"IEEE Software"},{"issue":"8","key":"10.1016\/S0065-2458(05)66003-2_bb0040","doi-asserted-by":"crossref","DOI":"10.1145\/1036474.1036486","article-title":"A conversation with Bruce Lindsay. Error recovery","volume":"2","author":"Bourne","year":"2004","journal-title":"ACM Queue"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0045","series-title":"Murphy\u2019s law, the fitness of evolving species, and the limits of software reliability","author":"Brady","year":"1999"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0050","series-title":"Software Requirements: Objects, Functions, & States","author":"Davis","year":"1993"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0055","doi-asserted-by":"crossref","unstructured":"Dewsbury G., Sommerville I., Clarke K., Rouncefield M., \u201cA dependability model for domestic systems\u201d, in: Proceedings of Safecomp 2003, Edinburgh.","DOI":"10.1007\/978-3-540-39878-3_9"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0060","series-title":"Information assurance\u2014DoD directive","author":"Department of Defense","year":"2002"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0065","series-title":"Guide to the software requirements definition phase","author":"European Space Agency","year":"1995"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0070","series-title":"The International Conference on Dependable Systems and Networks","article-title":"Modeling dependability for a diverse set of stakeholders","author":"Huynh","year":"2003"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0075","unstructured":"\u201cIEEE Std. 610.12-1990, IEEE Standard Glossary of Software Engineering Terminology\u201d."},{"key":"10.1016\/S0065-2458(05)66003-2_bb0080","unstructured":"IEEE Computer Society, \u201cIEEE Recommended Practice for Software Requirements Specifications, IEEE Std. 830-1998\u201d."},{"key":"10.1016\/S0065-2458(05)66003-2_bb0085","unstructured":"Knight J.C., \u201cAn introduction to computing system dependability\u201d, in: Proceedings of the 26th International Conference on Software Engineering (ICSE \u201904)."},{"key":"10.1016\/S0065-2458(05)66003-2_bb0090","series-title":"Practical Software Requirements: A Manual of Content & Style","author":"Kovitz","year":"1998"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0095","first-page":"2","article-title":"Dependable computing and fault tolerance: basic concepts and terminology","author":"Laprie","year":"1985"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0100","first-page":"257","article-title":"Dependability: Basic concepts and terminology","volume":"vol. 5","author":"Laprie","year":"1992"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0105","article-title":"Preventing requirement defects","author":"Lauesen","year":"2000"},{"key":"10.1016\/S0065-2458(05)66003-2_rf0100","doi-asserted-by":"crossref","DOI":"10.1109\/METRIC.1994.344234","article-title":"Learning to live with uncertainty in our software","author":"Littlewood","year":"1994"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0115","doi-asserted-by":"crossref","DOI":"10.1145\/336512.336551","article-title":"Software reliability and dependability: a roadmap","author":"Littlewood","year":"2000"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0120","series-title":"Jet Propulsion Laboratory","article-title":"Analyzing software errors in safety-critical, embedded systems","author":"Lutz","year":"1994"},{"issue":"7","key":"10.1016\/S0065-2458(05)66003-2_bb0125","article-title":"What is information assurance","volume":"15","author":"McKnight","year":"2002","journal-title":"CrossTalk\u2014The Journal of Defense Software Engineering"},{"issue":"2","key":"10.1016\/S0065-2458(05)66003-2_bb0130","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/S0164-1212(03)00241-3","article-title":"Computing system reliability using Markov chain usage models","volume":"73","author":"Prowell","year":"2004","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0135","series-title":"DSN Workshop on Dependability Benchmarking","article-title":"Empirical evaluation of techniques and methods used for achieving and assessing software high dependability","author":"Rus","year":"2002"},{"key":"10.1016\/S0065-2458(05)66003-2_bb0140","series-title":"Universal Design","article-title":"Multi-dimensional evaluation as a tool in teaching universal design","author":"Sandhu","year":"2002"}],"container-title":["Advances in Computers","Quality Software Development"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245805660032?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245805660032?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T19:43:16Z","timestamp":1559936596000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245805660032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9780120121663"],"references-count":27,"URL":"https:\/\/doi.org\/10.1016\/s0065-2458(05)66003-2","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2006]]}}}