{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:35Z","timestamp":1772164055888,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,18]],"date-time":"2014-10-18T00:00:00Z","timestamp":1413590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,18]]},"DOI":"10.1145\/2663171.2663177","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T08:29:24Z","timestamp":1413275364000},"page":"19-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Resolute"],"prefix":"10.1145","author":[{"given":"Andrew","family":"Gacek","sequence":"first","affiliation":[{"name":"Rockwell Collins, Minneapolis, MN, USA"}]},{"given":"John","family":"Backes","sequence":"additional","affiliation":[{"name":"Rockwell Collins, Minneapolis, MN, USA"}]},{"given":"Darren","family":"Cofer","sequence":"additional","affiliation":[{"name":"Rockwell Collins, Minneapolis, MN, USA"}]},{"given":"Konrad","family":"Slind","sequence":"additional","affiliation":[{"name":"Rockwell Collins, Minneapolis, MN, USA"}]},{"given":"Mike","family":"Whalen","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adelard. ASCE. http:\/\/www.adelard.com\/asce\/ .  Adelard. ASCE. http:\/\/www.adelard.com\/asce\/ ."},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/978-3-642-15651-9_6","volume-title":"Proceedings of the 2010 International Conference on Computer Safety, Reliability, and Security (SAFECOMP)","author":"Basir N.","year":"2010","unstructured":"N. Basir , E. Denney , and B. Fischer . Deriving safety cases for hierarchical structure in model-based development . In E. Schoitsch, editor, Proceedings of the 2010 International Conference on Computer Safety, Reliability, and Security (SAFECOMP) , volume 6351 of Lecture Notes in Computer Science , pages 68 -- 81 . Springer , 2010 . N. Basir, E. Denney, and B. Fischer. Deriving safety cases for hierarchical structure in model-based development. In E. Schoitsch, editor, Proceedings of the 2010 International Conference on Computer Safety, Reliability, and Security (SAFECOMP), volume 6351 of Lecture Notes in Computer Science, pages 68--81. Springer, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"ISSRE 2013","author":"Bishop P.","year":"2013","unstructured":"P. Bishop , R. Bloomfield , and L. Cyra . Combining testing and proof to gain high assurance in software . In ISSRE 2013 , November 2013 . P. Bishop, R. Bloomfield, and L. Cyra. Combining testing and proof to gain high assurance in software. In ISSRE 2013, November 2013."},{"key":"e_1_3_2_1_4_1","unstructured":"Boeing. Unmanned Little Bird. http:\/\/www.boeing.com\/boeing\/rotorcraft\/military\/ulb\/.  Boeing. Unmanned Little Bird. http:\/\/www.boeing.com\/boeing\/rotorcraft\/military\/ulb\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28891-3_13"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"S.\n      Cruanes G.\n      Hamon S.\n      Owre and \n      N.\n      Shankar\n  . \n  Tool integration with the evidential tool bus\n  . In R. Giacobazzi J. Berdine and I. Mastroeni editors Verification Model Checking and Abstract Interpretation volume \n  7737\n   of \n  Lecture Notes in Computer Science pages \n  275\n  --\n  294\n  . \n  Springer Berlin Heidelberg 2013\n  .  S. Cruanes G. Hamon S. Owre and N. Shankar. Tool integration with the evidential tool bus. In R. Giacobazzi J. Berdine and I. Mastroeni editors Verification Model Checking and Abstract Interpretation volume 7737 of Lecture Notes in Computer Science pages 275--294. Springer Berlin Heidelberg 2013.","DOI":"10.1007\/978-3-642-35873-9_18"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEPCOS-RELCOMEX.2007.44"},{"key":"e_1_3_2_1_8_1","unstructured":"Defense Advanced Research Projects Agency. High-Assurance Cyber Military Systems. http:\/\/www.darpa.mil\/Our_Work\/I2O\/Programs\/High-Assurance_Cyber_Military_Systems_(HACMS).aspx.  Defense Advanced Research Projects Agency. High-Assurance Cyber Military Systems. http:\/\/www.darpa.mil\/Our_Work\/I2O\/Programs\/High-Assurance_Cyber_Military_Systems_(HACMS).aspx."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2013.6688924"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40793-2_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33675-1_2"},{"key":"e_1_3_2_1_12_1","volume-title":"Model-Based Engineering with AADL: An Introduction to the SAE Architecture Analysis & Design Language","author":"Feiler P. H.","year":"2012","unstructured":"P. H. Feiler and D. P. Gluch . Model-Based Engineering with AADL: An Introduction to the SAE Architecture Analysis & Design Language . Addison-Wesley Professional , 1 st edition, 2012 . P. H. Feiler and D. P. Gluch. Model-Based Engineering with AADL: An Introduction to the SAE Architecture Analysis & Design Language. Addison-Wesley Professional, 1st edition, 2012.","edition":"1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2010.26"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA609836"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.17"},{"key":"e_1_3_2_1_16_1","volume-title":"24th International System Safety Conference","author":"Greenwell W.","year":"2006","unstructured":"W. Greenwell , J. Knight , C. M. Holloway , and J. Pease . A taxonomy of fallacies in system safety arguments . In 24th International System Safety Conference , August 2006 . W. Greenwell, J. Knight, C. M. Holloway, and J. Pease. A taxonomy of fallacies in system safety arguments. In 24th International System Safety Conference, August 2006."},{"key":"e_1_3_2_1_17_1","unstructured":"GSN. GSN community standard version 1. http:\/\/www.goalstructuringnotation.info\/documents\/GSN_Standard.pdf November 2011.  GSN. GSN community standard version 1. http:\/\/www.goalstructuringnotation.info\/documents\/GSN_Standard.pdf November 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041619.2041640"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2013.04.007"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2009 International System Safety Conference (ISSC)","author":"Hawkins R. D.","year":"2009","unstructured":"R. D. Hawkins and T. P. Kelly . A Systematic Approach for Developing Software Safety Arguments . In Proceedings of the 2009 International System Safety Conference (ISSC) , 2009 . R. D. Hawkins and T. P. Kelly. A Systematic Approach for Developing Software Safety Arguments. In Proceedings of the 2009 International System Safety Conference (ISSC), 2009."},{"key":"e_1_3_2_1_22_1","unstructured":"T. Kelly. Arguing Safety - A Systematic Approach to Managing Safety Cases. PhD thesis University of York 1998.  T. Kelly. Arguing Safety - A Systematic Approach to Managing Safety Cases. PhD thesis University of York 1998."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0997-6_5"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Dependable Systems and Networks 2004 Workshop on Assurance Cases","author":"Kelly T.","year":"2004","unstructured":"T. Kelly and R. Weaver . The goal structuring notation - a safety argument notation . In Proceedings of the Dependable Systems and Networks 2004 Workshop on Assurance Cases , July 2004 . T. Kelly and R. Weaver. The goal structuring notation - a safety argument notation. In Proceedings of the Dependable Systems and Networks 2004 Workshop on Assurance Cases, July 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2010.26"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646372"},{"key":"e_1_3_2_1_28_1","unstructured":"NASA. Certware. http:\/\/nasa.github.io\/CertWare\/.  NASA. Certware. http:\/\/nasa.github.io\/CertWare\/."},{"key":"e_1_3_2_1_29_1","unstructured":"Rockwell Collins. Resolute. https:\/\/github.com\/smaccm\/smaccm.  Rockwell Collins. Resolute. https:\/\/github.com\/smaccm\/smaccm."},{"key":"e_1_3_2_1_30_1","unstructured":"Software Engineering Institute Carnegie Mellon University. OSATE. http:\/\/www.aadl.info\/aadl\/currentsite\/tool\/osate.html.  Software Engineering Institute Carnegie Mellon University. OSATE. http:\/\/www.aadl.info\/aadl\/currentsite\/tool\/osate.html."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2011.0261"}],"event":{"name":"HILT '14: High Integrity Language Technology ACM SIGAda Annual Conference","location":"Portland Oregon USA","acronym":"HILT '14","sponsor":["SIGAda ACM Special Interest Group on Ada Programming Language","SIGAPP ACM Special Interest Group on Applied Computing","SIGPLAN ACM Special Interest Group on Programming Languages","Ada Europe Ada Europe","SIGBED ACM Special Interest Group on Embedded Systems","SIGSOFT ACM Special Interest Group on Software Engineering","SIGCAS ACM Special Interest Group on Computers and Society","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2014 ACM SIGAda annual conference on High integrity language technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663171.2663177","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663171.2663177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:47Z","timestamp":1750212827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663171.2663177"}},"subtitle":["an assurance case language for architecture models"],"short-title":[],"issued":{"date-parts":[[2014,10,18]]},"references-count":30,"alternative-id":["10.1145\/2663171.2663177","10.1145\/2663171"],"URL":"https:\/\/doi.org\/10.1145\/2663171.2663177","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2692956.2663177","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2014,10,18]]},"assertion":[{"value":"2014-10-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}