{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:47:45Z","timestamp":1768416465991,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T00:00:00Z","timestamp":1688515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,5]]},"DOI":"10.1145\/3628034.3628044","type":"proceedings-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T18:09:11Z","timestamp":1707156551000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Formal model-based argument patterns for security cases"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4990-4145","authenticated-orcid":false,"given":"Marwa","family":"Zeroual","sequence":"first","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, CEA, List, France and IRIT, CNRS, UT2, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2199-3916","authenticated-orcid":false,"given":"Brahim","family":"Hamid","sequence":"additional","affiliation":[{"name":"IRIT, CNRS, UT2, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0218-028X","authenticated-orcid":false,"given":"Morayo","family":"Adedjouma","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, CEA, List, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,2,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"MINIMUM OPERATIONAL PERFORMANCE STANDARDS FOR AIRBORNE COLLISION AVOIDANCE SYSTEM XU (ACAS XU) VOLUME I","author":"E\u00a0ED","unstructured":"EUROCAE\u00a0ED 275. 2020. MINIMUM OPERATIONAL PERFORMANCE STANDARDS FOR AIRBORNE COLLISION AVOIDANCE SYSTEM XU (ACAS XU) VOLUME I, VOLUME II ALGORITHM DESIGN DESCRIPTION. European Organization for Civil Aviation Equipment (EUROCAE)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606612"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"e_1_3_2_1_4_1","volume-title":"An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation.International Journal of Advanced Research in Computer Science 8, 3","author":"Ansari Tarique\u00a0Jamal","year":"2017","unstructured":"Tarique\u00a0Jamal Ansari and Dhirendra Pandey. 2017. An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation.International Journal of Advanced Research in Computer Science 8, 3 (2017)."},{"key":"e_1_3_2_1_5_1","first-page":"21","article-title":"Formal methods: Benefits, challenges and future direction","volume":"4","author":"Batra Mona","year":"2013","unstructured":"Mona Batra. 2013. Formal methods: Benefits, challenges and future direction. Journal of Global Research in Computer Science 4, 5 (2013), 21\u201325.","journal-title":"Journal of Global Research in Computer Science"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2298011"},{"key":"e_1_3_2_1_7_1","volume-title":"Railway applications-Communications, signalling and processing systems. Software for railway control and protection systems","author":"CENELEC.","year":"2000","unstructured":"EN50128 CENELEC. 2000. 50128, Railway applications-Communications, signalling and processing systems. Software for railway control and protection systems (2000)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2014.89"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Computer Safety, Reliability, and Security. Springer, 197\u2013209","author":"Finnegan Anita","year":"2014","unstructured":"Anita Finnegan and Fergal McCaffery. 2014. Towards an international security case framework for networked medical devices. In International Conference on Computer Safety, Reliability, and Security. Springer, 197\u2013209."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2692956.2663177"},{"key":"e_1_3_2_1_11_1","unstructured":"Assurance Case\u00a0Working Group 2018. Goal structuring notation community standard (version 2)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13556-9_9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA464842"},{"key":"e_1_3_2_1_14_1","volume-title":"Unmanned aircraft systems \u2014 Part 3: Operational procedures. Standard","author":"ISO","unstructured":"ISO 21384-3:2019(en) 2019. Unmanned aircraft systems \u2014 Part 3: Operational procedures. Standard. International Organization for Standardization."},{"key":"e_1_3_2_1_15_1","volume-title":"Road Vehicles Functional Safety. Standard","author":"ISO","unstructured":"ISO 26262:2011(E\/E) 2018. Road Vehicles Functional Safety. Standard. International Organization for Standardization, Geneva, CH."},{"key":"e_1_3_2_1_16_1","volume-title":"Software Abstractions: logic, language, and analysis","author":"Jackson Daniel","unstructured":"Daniel Jackson. 2012. Software Abstractions: logic, language, and analysis. MIT press."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 28th Conference on Pattern Languages of Programs(PLoP","author":"Jaskolka Jason","year":"2021","unstructured":"Jason Jaskolka, Brahim Hamid, Alvi Jawad, and Joe Samuel. 2021. Secure Development Decomposition \u2013 An Argument Pattern for Structured Assurance Case Models. In Proceedings of the 28th Conference on Pattern Languages of Programs(PLoP 2021). Online, 1\u201312."},{"key":"e_1_3_2_1_18_1","volume-title":"Version 2.0.","author":"Kiernan Kristine","year":"2020","unstructured":"Kristine Kiernan, Robert Joslin, and John Robbins. 2020. Standardization Roadmap for Unmanned Aircraft Systems, Version 2.0. (2020)."},{"key":"e_1_3_2_1_19_1","volume-title":"8th International Conference on Information Society and Technology, Vol.\u00a016","author":"Luburi\u0107 Nikola","year":"2018","unstructured":"Nikola Luburi\u0107, Goran Sladi\u0107, Branko Milosavljevi\u0107, and Aleksandar Kaplar. 2018. Demonstrating enterprise system security using an asset-centric security assurance framework. In 8th International Conference on Information Society and Technology, Vol.\u00a016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2016.7778055"},{"key":"e_1_3_2_1_21_1","volume-title":"Fundamentals of secure system modelling","author":"Matulevi\u010dius Raimundas","unstructured":"Raimundas Matulevi\u010dius. 2017. Fundamentals of secure system modelling. Springer."},{"key":"e_1_3_2_1_22_1","volume-title":"Defence Standard 00-56 Issue 4","author":"UK","year":"2007","unstructured":"UK MoD. 2007. Safety Management Requirements for Defence Systems Part 1 Requirements. Ministry of Defence, Defence Standard 00-56 Issue 4 (2007)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09971-7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(09)70008-X"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.01.001"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102073"},{"key":"e_1_3_2_1_27_1","unstructured":"John Rushby. 1993. Formal methods and the certification of critical systems. Vol.\u00a037. SRI International Computer Science Laboratory."},{"key":"e_1_3_2_1_28_1","unstructured":"SAE International. 2021. ISO\/SAE 21434: Road Vehicles \u2013 Cybersecurity Engineering."},{"key":"e_1_3_2_1_29_1","volume-title":"Threat modeling: Designing for security","author":"Shostack Adam","unstructured":"Adam Shostack. 2014. Threat modeling: Designing for security. John Wiley & Sons."},{"key":"e_1_3_2_1_30_1","volume-title":"The Z notation. Vol.\u00a029","author":"Spivey J\u00a0Michael","unstructured":"J\u00a0Michael Spivey and JR Abrial. 1992. The Z notation. Vol.\u00a029. Prentice Hall Hemel Hempstead."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-022-00660-4"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407070"},{"key":"e_1_3_2_1_33_1","volume-title":"International Civil Aviation Organization (ICAO)","author":"Weber Ludwig","unstructured":"Ludwig Weber. 2021. International Civil Aviation Organization (ICAO). Kluwer Law International BV."},{"key":"e_1_3_2_1_34_1","unstructured":"Charles\u00a0B Weinstock Howard\u00a0F Lipson and John Goodenough. 2007. Arguing security-creating security assurance cases. Technical Report. Carnegie Mellon University."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2017.52"}],"event":{"name":"EuroPLoP 2023: 28th European Conference on Pattern Languages of Programs","location":"Irsee Germany","acronym":"EuroPLoP 2023"},"container-title":["Proceedings of the 28th European Conference on Pattern Languages of Programs"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628034.3628044","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628034.3628044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:59:46Z","timestamp":1755907186000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628034.3628044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,5]]},"references-count":35,"alternative-id":["10.1145\/3628034.3628044","10.1145\/3628034"],"URL":"https:\/\/doi.org\/10.1145\/3628034.3628044","relation":{},"subject":[],"published":{"date-parts":[[2023,7,5]]},"assertion":[{"value":"2024-02-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}