{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:11:12Z","timestamp":1760710272616},"reference-count":44,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,6,1]]},"DOI":"10.1587\/transinf.2019kbp0014","type":"journal-article","created":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T22:09:56Z","timestamp":1590962996000},"page":"1297-1308","source":"Crossref","is-referenced-by-count":5,"title":["Facilitating Use of Assurance Cases in Industries by Workshops with an Agent-Based Method"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Yutaka","family":"MATSUNO","sequence":"first","affiliation":[{"name":"Nihon University"}]},{"given":"Toshinori","family":"TAKAI","sequence":"additional","affiliation":[{"name":"Nara Advanced Institute of Science and Technology"}]},{"given":"Shuichiro","family":"YAMAMOTO","sequence":"additional","affiliation":[{"name":"Nagoya University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] S. Yamamoto, Y. Matsuno, and M. Tokoro, \u201cd* framework: Inter-dependency model for dependability (fast abstract),\u201d IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012, pp.1-2, 2012."},{"key":"2","unstructured":"[2] Y. Onuma, T. Takai, T. Koshiyama, and Y. Matsuno, \u201cD-case steps: New steps for writing assurance cases,\u201d Proc. Computer Safety, Reliability, and Security-SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, V\u00e4ster\u00e5s, Sweden, Sept. 18, 2018, pp.71-78, 2018."},{"key":"3","unstructured":"[3] European Organisation for the Safety of Air Navigation, \u201cSafety case development manual.\u201d European Air Traffic Management, 2006."},{"key":"4","unstructured":"[4] Railtrack, \u201cYellow book 3.\u201d Engineering Safety Management Issue3, vol.1, vol.2, 2000."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] R. Bloomfield and P. Bishop, \u201cSafety and assurance cases: Past, present and possible future-an Adelard perspective,\u201d Proc. Eighteenth Safety-Critical Systems Symposium, Bristol, UK, 2010.","DOI":"10.1007\/978-1-84996-086-1_4"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] T. Kelly, \u201cArguing Safety-A Systematic Approach to Safety Case Management,\u201d Ph.D. thesis, Department of Computer Science, University of York, 1998.","DOI":"10.1007\/3-540-48249-0_2"},{"key":"7","unstructured":"[7] Assurance Case Working Group, \u201cGoal structuring notation community standard version 2,\u201d Jan. 2018. downloaded from https:\/\/scsc.uk\/r141B:1."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] S. Yamamoto and Y. Matsuno, \u201cAn evaluation of argument patterns to reduce pitfalls of applying assurance case,\u201d Proc. 1st International Workshop on Assurance Cases for Software-Intensive Systems, ASSURE &apos;13, San Francisco, California, USA, May 19, 2013, pp.12-17, 2013. 10.1109\/assure.2013.6614265","DOI":"10.1109\/ASSURE.2013.6614265"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] Y. Matsuno, J. Nakazawa, M. Takeyama, M. Sugaya, and Y. Ishikawa, \u201cToward a language for communication among stakeholders,\u201d Proc. 16th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC&apos;10), pp.93-100, 2010. 10.1109\/prdc.2010.47","DOI":"10.1109\/PRDC.2010.47"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] R. Hawkins, K. Clegg, R. Alexander, and T. Kelly, \u201cUsing a software safety argument pattern catalogue: Two case studies,\u201d Proc. Computer Safety, Reliability, and Security-30th International Conference, SAFECOMP 2011, Naples, Italy, Sept. 19-22, 2011, pp.185-198, 2011. 10.1007\/978-3-642-24270-0_14","DOI":"10.1007\/978-3-642-24270-0_14"},{"key":"11","unstructured":"[11] N. Leveson, \u201cThe use of safety cases in certification and regulation,\u201d ESD Working Paper Series, Boston: MIT, 2011."},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] J. Birch, R. Rivett, I. Habli, B. Bradshaw, J. Botham, D. Higham, P. Jesty, H. Monkhouse, and R. Palin, \u201cSafety cases and their role in ISO 26262 functional safety assessment,\u201d Proc. Computer Safety, Reliability, and Security-32nd International Conference,SAFECOMP 2013, Toulouse, France, Sept. 24-27, 2013, pp.154-165, 2013. 10.1007\/978-3-642-40793-2_15","DOI":"10.1007\/978-3-642-40793-2_15"},{"key":"13","unstructured":"[13] R. Alexander, T. Kelly, Z. Kurd, and J. McDermid, \u201cSafety cases for advanced control software: Safety case patterns,\u201d tech. rep., Department of Computer Science, University of York, 2007."},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] T. Kelly and J. McDermid, \u201cSafety case patterns-reusing successful arguments,\u201d IEE Colloquium on Understanding Patterns and Their Application to System Engineering, 1998. 10.1049\/ic:19980543","DOI":"10.1049\/ic:19980543"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] J.B. Goodenough, C.B. Weinstock, and A.Z. Klein., \u201cToward a theory of assurance case confidence,\u201d tech. rep., Carnegie Mellon, 2012.","DOI":"10.21236\/ADA609836"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] P.J. Graydon, \u201cTowards a clearer understanding of context and its role in assurance argument confidence,\u201d Proc. Computer Safety, Reliability, and Security-33rd International Conference, SAFECOMP 2014, Florence, Italy, Sept. 10-12, 2014, pp.139-154, 2014. 10.1007\/978-3-319-10506-2_10","DOI":"10.1007\/978-3-319-10506-2_10"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] L. Duan, S. Rayadurgam, M.P.E. Heimdahl, O. Sokolsky, and I. Lee, \u201cRepresentation of confidence in assurance cases using the beta distribution,\u201d 17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016, Orlando, FL, USA, Jan. 7-9, 2016, pp.86-93, 2016. 10.1109\/hase.2016.52","DOI":"10.1109\/HASE.2016.52"},{"key":"18","unstructured":"[18] E. Denney, G. Pai, and J. Pohl, \u201cAdvocate: An assurance case automation toolset,\u201d Proc. Computer Safety, Reliability, and Security-SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM\/EWICS, IWDE, Magdeburg, Germany, Sept. 25-28, 2012, pp.8-21, 2012."},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] Y. Matsuno, \u201cD-case communicator: A web based GSN editor for multiple stakeholders,\u201d Proc. Computer Safety, Reliability, and Security-SAFECOMP 2017 Workshops, ASSURE, DECSoS,SASSUR, TELERISE, and TIPS, Trento, Italy, Sept. 12, 2017, pp.64-69, 2017.","DOI":"10.1007\/978-3-319-66284-8_6"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] Y. Matsuno, \u201cA design and implementation of an assurance case language,\u201d 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23-26, 2014, pp.630-641, 2014. 10.1109\/dsn.2014.97","DOI":"10.1109\/DSN.2014.97"},{"key":"21","unstructured":"[21] J. Rushby, \u201cThe interpretation and evaluation of assurance cases,\u201d Tech. Rep. SRI-CSL-15-01, Computer Science Laboratory, SRI International, Menlo Park, CA, July 2015. Available at http:\/\/www.csl.sri.com\/users\/rushby\/papers\/sri-csl-15-1-assurance-cases.pdf."},{"key":"22","unstructured":"[22] C.B. Weinstock, \u201cAssurance cases,\u201d Dec. 2008. downloaded from http:\/\/www.seas.upenn.edu\/~lee\/09cis480\/lec-AssuranceCasesTutorial.pdf."},{"key":"23","unstructured":"[23] Adelard, Adelard Safety Case Development Manual, Adelard, 1998."},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] E. Yu, \u201cSocial modeling and i*,\u201d Conceptual Modeling: Foundations and Applications-Essays in Honor of John Mylopoulos, pp.99-121, 2009.","DOI":"10.1007\/978-3-642-02463-4_7"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] A. Dardenne, A. van Lamsweerde, and S. Fickas, \u201cGoal-directed requirements acquisition,\u201d Sci. Comput. Program., vol.20, no.1-2, pp.3-50, 1993. 10.1016\/0167-6423(93)90021-g","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"26","unstructured":"[26] T. Saruwatari, \u201cA Study on Assurance Cases Construction based on the Notion of Actors,\u201d (in Japanese), Ph.D. thesis, Institute of Information Security, 2013."},{"key":"27","unstructured":"[27] Q. Zhi, Z. Zhou, and S. Yamamoto, \u201cVisualized assurance approach for enterprise architecture,\u201d J. lnf. Commun. Converg. Eng., vol.17, no.2, pp.117-127, June 2019."},{"key":"28","unstructured":"[28] The Open Group, \u201cArchimate 3.0 specification,\u201d 2016."},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] H. Kawakami, R. Gallo, R. Dahab, and E. Nascimento, \u201cHardware security evaluation using assurance case models,\u201d 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, Aug. 24-27, 2015, pp.193-198, 2015. 10.1109\/ares.2015.60","DOI":"10.1109\/ARES.2015.60"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] Y. Matsuno, H. Takamura, and Y. Ishikawa, \u201cA dependability case editor with pattern library,\u201d Procs. IEEE 12th International Symposium on High-Assurance Systems Engineering (HASE), pp.170-171, 2010. 10.1109\/hase.2010.26","DOI":"10.1109\/HASE.2010.26"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] T. Kaneko, \u201cCC-Case: An Integration Method of Security Requirement Analysis and Assurance,\u201d (in Japanese), Ph.D. thesis, Institute of Information Security, 2014.","DOI":"10.17781\/P001274"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] S. Yamamoto, T. Kaneko, and H. Tanaka, \u201cA proposal on security case based on common criteria,\u201d Proc. Information and Communicatiaon Technology-International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, pp.331-336, 2013. 10.1007\/978-3-642-36818-9_36","DOI":"10.1007\/978-3-642-36818-9_36"},{"key":"33","unstructured":"[33] N. Kobayashi, \u201cA Study on Dependability Assurance Methods for In-Vehicle Systems,\u201d (in Japanese), Ph.D. thesis, Nagoya University, 2018."},{"key":"34","unstructured":"[34] N. Kobayashi, S. Morisaki, and S. Yamamoto, \u201cThe method of explanation for safety analysis results using d-case,\u201d Journal of Information Processing Society of Japan, vol.58, no.2, pp.521-530, 2017."},{"key":"35","unstructured":"[35] K. Kakimoto, S. Kawaguchi, T. Takai, N. Ishihama, H. Iida, and M. Katahira, \u201cExplication and evaluation of general safety requirements using gsn,\u201d SEC Journal, vol.12, no.3, pp.16-23, 2016."},{"key":"36","unstructured":"[36] R. Steinzor, \u201cLessons from the North Sea: Should \u201cSafety Cases Come to America?,\u201d B.C. Envtl. Aff. L. Rev., vol.38, pp.417-444, 2011."},{"key":"37","doi-asserted-by":"crossref","unstructured":"[37] L. Gauerhof, P. Munk, and S. Burton, \u201cStructuring validation targets of a machine learning function applied to automated driving,\u201d Proc. Computer Safety, Reliability, and Security-37th International Conference, SAFECOMP 2018, V\u00e4ster\u00e5s, Sweden, Sept. 19-21, 2018, pp.45-58, 2018. 10.1007\/978-3-319-99130-6_4","DOI":"10.1007\/978-3-319-99130-6_4"},{"key":"38","unstructured":"[38] F. Ishikawa and Y. Matsuno, \u201cContinuous argument engineering: Tackling uncertainty in machine learning based systems,\u201d Proc. Computer Safety, Reliability, and Security-SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, V\u00e4ster\u00e5s, Sweden, Sept. 18, 2018, pp.14-21, 2018."},{"key":"39","doi-asserted-by":"crossref","unstructured":"[39] R.E. Bloomfield, B. Littlewood, and D. Wright, \u201cConfidence: Its role in dependability cases for risk assessment,\u201d DSN, pp.338-346, 2007. 10.1109\/dsn.2007.29","DOI":"10.1109\/DSN.2007.29"},{"key":"40","doi-asserted-by":"crossref","unstructured":"[40] J. Spriggs, GSN-The Goal Structuring Notation: A Structured Approach to Presenting Arguments, Springer, 2012. 10.1007\/978-1-4471-2312-5_11","DOI":"10.1007\/978-1-4471-2312-5"},{"key":"41","unstructured":"[41] J. Keller, Motivational Design of Instruction, Hillsdale, NJ: Lawrence Erlbaum Associates, 1983."},{"key":"42","doi-asserted-by":"crossref","unstructured":"[42] M. Tokoro, ed., Open Systems Dependability: Dependability Engineering for Ever-Changing Systems, CRC Press, 2012. 10.1201\/b13154","DOI":"10.1201\/b13154"},{"key":"43","doi-asserted-by":"crossref","unstructured":"[43] Y. Matsuno and S. Yamamoto, \u201cAn implementation of GSN community standard,\u201d Proc. 1st International Workshop on Assurance Cases for Software-intensive Systems (ASSURE 2013), pp.24-28, 2013. 10.1109\/assure.2013.6614267","DOI":"10.1109\/ASSURE.2013.6614267"},{"key":"44","doi-asserted-by":"crossref","unstructured":"[44] H. Fujita, Y. Matsuno, T. Hanawa, M. Sato, S. Kato, and Y. Ishikawa, \u201cDS-Bench toolset: Tools for dependability benchmarking with simulation and assurance,\u201d IEEE DSN, 2012. 8 pages. 10.1109\/dsn.2012.6263915","DOI":"10.1109\/DSN.2012.6263915"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/6\/E103.D_2019KBP0014\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T21:41:13Z","timestamp":1666734073000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/6\/E103.D_2019KBP0014\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,1]]},"references-count":44,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019kbp0014","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,1]]}}}