{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:15Z","timestamp":1750307415812,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1145\/1806799.1806823","type":"proceedings-article","created":{"date-parts":[[2010,6,8]],"date-time":"2010-06-08T12:37:34Z","timestamp":1276000654000},"page":"135-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Liability in software engineering"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Le M\u00e9tayer","sequence":"first","affiliation":[{"name":"LICIT, INRIA Grenoble Rh\u00f4ne-Alpes"}]},{"given":"Manuel","family":"Maarek","sequence":"additional","affiliation":[{"name":"LICIT, INRIA Grenoble Rh\u00f4ne-Alpes"}]},{"given":"Val\u00e9rie Viet Triem","family":"Tong","sequence":"additional","affiliation":[{"name":"SSIR, Sup\u00e9lec Rennes"}]},{"given":"Eduardo","family":"Mazza","sequence":"additional","affiliation":[{"name":"University of Grenoble"}]},{"given":"Marie-Laure","family":"Potet","sequence":"additional","affiliation":[{"name":"University of Grenoble"}]},{"given":"Nicolas","family":"Craipeau","sequence":"additional","affiliation":[{"name":"University of Caen, Basse-Normandie"}]},{"given":"St\u00e9phane","family":"Fr\u00e9not","sequence":"additional","affiliation":[{"name":"AMAZONES, INRIA Grenoble Rh\u00f4ne-Alpes, INSA Lyon"}]},{"given":"Ronan","family":"Hardouin","sequence":"additional","affiliation":[{"name":"University of Versailles, Saint-Quentin-en-Yvelines"}]}],"member":"320","published-online":{"date-parts":[[2010,5]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"IFIP","first-page":"329","volume-title":"SEC","author":"Accorsi R.","year":"2006","unstructured":"R. Accorsi . On the relationship of privacy and secure remote logging in dynamic systems . In SEC , volume 201 of IFIP , pages 329 -- 339 . Springer , 2006 . R. Accorsi. On the relationship of privacy and secure remote logging in dynamic systems. In SEC, volume 201 of IFIP, pages 329--339. Springer, 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"Information security economics --- and beyond. Information Security Summit (IS2)","author":"Anderson R.","year":"2009","unstructured":"R. Anderson and T. Moore . Information security economics --- and beyond. Information Security Summit (IS2) , 2009 . R. Anderson and T. Moore. Information security economics --- and beyond. Information Security Summit (IS2), 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.06.013"},{"key":"e_1_3_2_1_4_1","volume-title":"IARP\/IEEE-RAS Workshop on robot dependability: technological challenges of dependable robots in human environments","author":"Avizienis A.","year":"2001","unstructured":"A. Avizienis , J.-C. Laprie and B. Randell . Fundamental concepts of computer system dependability . In IARP\/IEEE-RAS Workshop on robot dependability: technological challenges of dependable robots in human environments , 2001 . A. Avizienis, J.-C. Laprie and B. Randell. Fundamental concepts of computer system dependability. In IARP\/IEEE-RAS Workshop on robot dependability: technological challenges of dependable robots in human environments, 2001."},{"key":"e_1_3_2_1_5_1","unstructured":"D. M. Berry. Abstract appliances and software: The importance of the buyer's warranty and the developer's liability in promoting the use of systematic quality assurance and formal methods. CiteSeerX http:\/\/www.scientificcommons.org\/42749418 2007.  D. M. Berry. Abstract appliances and software: The importance of the buyer's warranty and the developer's liability in promoting the use of systematic quality assurance and formal methods. CiteSeerX http:\/\/www.scientificcommons.org\/42749418 2007."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.24"},{"key":"e_1_3_2_1_7_1","volume-title":"International Workshop on Principles of Diagnosis","author":"Brandan-Briones L.","year":"2008","unstructured":"L. Brandan-Briones , A. Lazovik , and P. Dague . Optimal observability for diagnosability . In International Workshop on Principles of Diagnosis , 2008 . L. Brandan-Briones, A. Lazovik, and P. Dague. Optimal observability for diagnosability. In International Workshop on Principles of Diagnosis, 2008."},{"key":"e_1_3_2_1_8_1","volume-title":"July","author":"Craipeau N.","year":"2009","unstructured":"N. Craipeau . Digital evidence - La preuve \u00e9lectronique. TR , Deliverable LISE D1.3 , July 2009 . N. Craipeau. Digital evidence - La preuve \u00e9lectronique. TR, Deliverable LISE D1.3, July 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Cooperative Information Systems (IJCIS), 14(2--3):99--129","author":"Farrell A. D. H.","year":"2005","unstructured":"A. D. H. Farrell , M. J. Sergot , M. Sall\u00e9 , and C. Bartolini . Using the event calculus for tracking the normative state of contracts . International Journal of Cooperative Information Systems (IJCIS), 14(2--3):99--129 , 2005 . A. D. H. Farrell, M. J. Sergot, M. Sall\u00e9, and C. Bartolini. Using the event calculus for tracking the normative state of contracts. International Journal of Cooperative Information Systems (IJCIS), 14(2--3):99--129, 2005."},{"key":"e_1_3_2_1_10_1","volume-title":"International Journal of Digital Evidence (IJDE), 6(2):1--21","author":"Gladyshev P.","year":"2007","unstructured":"P. Gladyshev and A. Enbacka . Rigorous development of automated inconsistency checks for digital evidence using the B method . International Journal of Digital Evidence (IJDE), 6(2):1--21 , 2007 . P. Gladyshev and A. Enbacka. Rigorous development of automated inconsistency checks for digital evidence using the B method. International Journal of Digital Evidence (IJDE), 6(2):1--21, 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2006.22"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-007-9054-0"},{"key":"e_1_3_2_1_13_1","volume-title":"Deliverable LISE D1.1","author":"Hardouin R.","year":"2009","unstructured":"R. Hardouin . Liability in software contracts - Le sens des responsabiliti\u00e9s en mati\u00e8re de contrats informatiques. TR , Deliverable LISE D1.1 , July 2009 . R. Hardouin. Liability in software contracts - Le sens des responsabiliti\u00e9s en mati\u00e8re de contrats informatiques. TR, Deliverable LISE D1.1, July 2009."},{"key":"e_1_3_2_1_14_1","volume-title":"Computer system intrusion detection: a survey. TR","author":"Jones A. K.","year":"1999","unstructured":"A. K. Jones and R. S. Sielken . Computer system intrusion detection: a survey. TR , University of Virginia Computer Science Department , 1999 . A. K. Jones and R. S. Sielken. Computer system intrusion detection: a survey. TR, University of Virginia Computer Science Department, 1999."},{"key":"e_1_3_2_1_15_1","series-title":"LNCS","first-page":"160","volume-title":"MKM","author":"Kamareddine F.","year":"2004","unstructured":"F. Kamareddine , M. Maarek , and J. B. Wells . Flexible encoding of mathematics on the computer . In MKM , volume 3119 of LNCS , pages 160 -- 174 , 2004 . F. Kamareddine, M. Maarek, and J. B. Wells. Flexible encoding of mathematics on the computer. In MKM, volume 3119 of LNCS, pages 160--174, 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01465-9_11"},{"key":"e_1_3_2_1_17_1","first-page":"143","volume-title":"Les clauses limitatives de responsabilit\u00e9 et de garantie dans les contrats informatiques. Approche comparative France\/\u00c9tats-Unis. Quelles limitations. Expertises des syst\u00e8mes d'information, no. 237","author":"Lipovetsky S.","year":"2000","unstructured":"S. Lipovetsky . Les clauses limitatives de responsabilit\u00e9 et de garantie dans les contrats informatiques. Approche comparative France\/\u00c9tats-Unis. Quelles limitations. Expertises des syst\u00e8mes d'information, no. 237 , pages 143 -- 148 , May 2000 . S. Lipovetsky. Les clauses limitatives de responsabilit\u00e9 et de garantie dans les contrats informatiques. Approche comparative France\/\u00c9tats-Unis. Quelles limitations. Expertises des syst\u00e8mes d'information, no. 237, pages 143--148, May 2000."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336551"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(03)00095-4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v39:5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146269.1146291"},{"key":"e_1_3_2_1_22_1","volume-title":"The Fun of Programming, Cornerstones of Computing","author":"Peyton Jones S. L.","year":"2003","unstructured":"S. L. Peyton Jones and J.-M. Eber . How to write a financial contract . In The Fun of Programming, Cornerstones of Computing , chapter 6. 2003 . S. L. Peyton Jones and J.-M. Eber. How to write a financial contract. In The Fun of Programming, Cornerstones of Computing, chapter 6. 2003."},{"key":"e_1_3_2_1_23_1","first-page":"628","volume-title":"European Conference on Artificial Intelligence (ECAI)","author":"Picardi C.","year":"2002","unstructured":"C. Picardi , R. Bray , F. Cascio , L. Console ., P. Dague , O. Dressler , D. Millet , B. Rhefus ., P. Struss and C. Vall\u00e9e . IDD: integrating diagnosis in the design of automotive systems . In European Conference on Artificial Intelligence (ECAI) , pages 628 -- 632 , 2002 . C. Picardi, R. Bray, F. Cascio, L. Console., P. Dague, O. Dressler, D. Millet, B. Rhefus., P. Struss and C. Vall\u00e9e. IDD: integrating diagnosis in the design of automotive systems. In European Conference on Artificial Intelligence (ECAI), pages 628--632, 2002."},{"key":"e_1_3_2_1_24_1","series-title":"LNCS","first-page":"174","volume-title":"FMOODS","author":"Prisacariu C.","year":"2007","unstructured":"C. Prisacariu and G. Schneider . A formal language for electronic contracts . In FMOODS , volume 4468 of LNCS , pages 174 -- 189 . Springer , 2007 . C. Prisacariu and G. Schneider. A formal language for electronic contracts. In FMOODS, volume 4468 of LNCS, pages 174--189. Springer, 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453125"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11560326_25"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176999"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.30"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999422"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216993.1216997"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2004.11.005"},{"key":"e_1_3_2_1_33_1","volume-title":"Modeling of post-incident root cause analysis. Digital Evidence, 2(2)","author":"Stephenson P.","year":"2003","unstructured":"P. Stephenson . Modeling of post-incident root cause analysis. Digital Evidence, 2(2) , 2003 . P. Stephenson. Modeling of post-incident root cause analysis. Digital Evidence, 2(2), 2003."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-COMPANION.2009.5071007"},{"key":"e_1_3_2_1_35_1","volume-title":"Perspectives in Concurrency Theory: A Festschrift for P. S. Thiagarajan","author":"Yang S.","year":"2009","unstructured":"S. Yang , L. H\u00e9lou\u00ebt , and T. Gazagnaire . Logic-based diagnosis for distributed systems . In Perspectives in Concurrency Theory: A Festschrift for P. S. Thiagarajan . CRC Press , 2009 . S. Yang, L. H\u00e9lou\u00ebt, and T. Gazagnaire. Logic-based diagnosis for distributed systems. In Perspectives in Concurrency Theory: A Festschrift for P. S. Thiagarajan. CRC Press, 2009."}],"event":{"name":"ICSE '10: 32nd International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Cape Town South Africa","acronym":"ICSE '10"},"container-title":["Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering - Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806799.1806823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1806799.1806823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:37Z","timestamp":1750246777000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806799.1806823"}},"subtitle":["overview of the LISE approach and illustration on a case study"],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":35,"alternative-id":["10.1145\/1806799.1806823","10.1145\/1806799"],"URL":"https:\/\/doi.org\/10.1145\/1806799.1806823","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]},"assertion":[{"value":"2010-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}