{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T20:58:20Z","timestamp":1725829100229},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319242545"},{"type":"electronic","value":"9783319242552"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24255-2_23","type":"book-chapter","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T09:51:13Z","timestamp":1441446673000},"page":"313-327","source":"Crossref","is-referenced-by-count":16,"title":["A Model for Safety Case Confidence Assessment"],"prefix":"10.1007","author":[{"given":"J\u00e9r\u00e9mie","family":"Guiochet","sequence":"first","affiliation":[]},{"given":"Quynh Anh","family":"Do Hoang","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Kaaniche","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-642-33678-2_26","volume-title":"Computer Safety, Reliability, and Security","author":"A Ayoub","year":"2012","unstructured":"Ayoub, A., Kim, B.G., Lee, I., Sokolsky, O.: A systematic approach to justifying sufficient confidence in software safety arguments. In: Ortmeier, F., Lipaczewski, M. (eds.) SAFECOMP 2012. LNCS, vol. 7612, pp. 305\u2013316. Springer, Heidelberg (2012)"},{"key":"23_CR2","unstructured":"Anaheed, A., Jian, C., Oleg, S., Insup, L.: Assessing the overall sufficiency of safety arguments. In: 21st Safety-critical Systems Symposium (SSS\u201913), Bristol, United Kingdom (2013)"},{"key":"23_CR3","unstructured":"Bishop, P., Bloomfield, R., Guerra, S.: The future of goal-based assurance cases. In: DSN Workshop on Assurance Cases: Best Practices, Possibles Obstacles, and Future Opportunities. Florence, Italy, July 2004"},{"issue":"1","key":"23_CR4","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ress.2010.06.027","volume":"96","author":"L Cyra","year":"2011","unstructured":"Cyra, L., G\u00f3rski, J.: Support for argument structures review and assessment. Reliab. Eng. Syst. Saf. 96(1), 26\u201337 (2011)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0167-6423(93)90021-G","volume":"20","author":"A Dardenne","year":"1993","unstructured":"Dardenne, A., Fickas, S., van Lamsweerde, A.: Goal-directed requirements acquisition. Sci. Comput. Program. 20, 3\u201350 (1993)","journal-title":"Sci. Comput. Program."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"DefStan 00\u201356: Defence standard 00\u201356 issue 3: Safety management requirements for defence systems. UK Ministry of Defence (2004)","DOI":"10.1038\/vital178"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Denney, E., Habli, I., Pai, G.: Towards measurements of confidence in safety cases. In: Proceedings of the 5th International Symposium on Empirical Software Engineering and Measurement (ESEM 2011). Banff, Canada, September 2011","DOI":"10.1109\/ESEM.2011.53"},{"key":"23_CR8","unstructured":"D\u00edez, F.J., Druzdzel, M.J.: Canonical probabilistic models for knowledge engineering. In: UNED Technical reports, Research Center on Intelligent Decision-Support Systems. Madrid, Spain (2007)"},{"key":"23_CR9","unstructured":"Do Hoang, Q.: Analyse et justification de la s\u00e9curit\u00e9 de syst\u00e8mes robotiques en interaction physique avec l\u2019humain (in French). Ph.D. thesis, INP Toulouse, LAAS-CNRS (2015)"},{"key":"23_CR10","unstructured":"Felipe, A., Mohamed, S., Walter, S., Siqi, Q.: On the distinction between aleatory and epistemic uncertainty and its implications on reliability and risk analysis. In: European Safety and Reliability Conference, ESREL 2013 (2013)"},{"key":"23_CR11","doi-asserted-by":"crossref","DOI":"10.1201\/b13102","volume-title":"Risk Assessment and Decision Analysis with Bayesian Networks","author":"N Fenton","year":"2012","unstructured":"Fenton, N., Neil, M.: Risk Assessment and Decision Analysis with Bayesian Networks. CRC Press, Taylor and francis Group, Boca Raton (2012)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Goodenough, J., Weinstock, C., Klein, A.: Eliminative induction: A basis for arguing system confidence. In: 35th International Conference on Software Engineering (ICSE2013), pp. 1161\u20131164, May 2013","DOI":"10.1109\/ICSE.2013.6606668"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Goodenough, J.B., Weinstock, C.B., Klein, A.Z.: Toward a theory of assurance case confidence. In: Software Engineering Institute, Carnagie Mellon University (2012)","DOI":"10.21236\/ADA609836"},{"key":"23_CR14","unstructured":"GSN-Standard: GSN COMMUNITY STANDARD VERSION 1 (2011). \n http:\/\/www.goalstructuringnotation.info\n \n . Accessed Decembre 18th 2014"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Guiochet, J., Do Hoang, Q.A., Kaaniche, M., Powell, D.: Model-based safety analysis of human-robot interactions: The MIRAS walking assistance robot. In: 2013 IEEE International Conference on Rehabilitation Robotics (ICORR), pp. 1\u20137 (2013)","DOI":"10.1109\/ICORR.2013.6650433"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Hawkins, R., Kelly, T., Knight, J., Graydon, P.: A new approach to creating clear safety arguments. In: Proceedings of 19th Safety Critical Systems Symposium. Southampton, UK, February 2011","DOI":"10.1007\/978-0-85729-133-2_1"},{"issue":"3","key":"23_CR17","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10503-005-4422-y","volume":"19","author":"D Hitchcock","year":"2005","unstructured":"Hitchcock, D.: Good reasoning on the toulmin model. Argumentation 19(3), 373\u2013391 (2005)","journal-title":"Argumentation"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Hobbs, C., Lloyd, M.: The application of bayesian belief networks to assurance case preparation. In: Proceedings of the 20th Safety-Critical Systems Symposium, Bristol, UK. pp. 159\u2013176. Springer London (2012)","DOI":"10.1007\/978-1-4471-2494-8_12"},{"key":"23_CR19","unstructured":"Kelly, T.P.: Arguing safety - a systematic approach to managing safety cases. Ph.D. thesis, University of York (1998)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Kelly, T., McDermid, J.: Safety case construction and reuse using patterns. In: 16th International Conference on Computer Safety and Reliability (SAFECOMP97) (1997)","DOI":"10.1007\/978-1-4471-0997-6_5"},{"issue":"5","key":"23_CR21","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TSE.2007.1002","volume":"33","author":"B Littlewood","year":"2007","unstructured":"Littlewood, B., Wright, D.: The use of multilegged arguments to increase confidence in safety claims for software-based systems: A study based on a BBN analysis of an idealized example. IEEE Trans. Softw. Eng. 33(5), 347\u2013365 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"23_CR22","unstructured":"OMG-ARM: Structured assurance case metamodel (SACM), version 1. Object Management Group (2013)"},{"volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","year":"1988","author":"J Pearl","key":"23_CR23","unstructured":"Pearl, J.: Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann Publishers Inc., San Francisco (1988)"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Pollock, J.: Defeasible reasoning. In: Reasoning: Studies of Human Inference and Its Foundations, pp. 451\u2013469 (2008)","DOI":"10.1017\/CBO9780511814273.025"},{"volume-title":"The uses of argument","year":"1958","author":"S Toulmin","key":"23_CR25","unstructured":"Toulmin, S.: The uses of argument. Cambridge University Press, Cambridge (1958)"},{"key":"23_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-33675-1_7","volume-title":"Computer Safety, Reliability, and Security","author":"X Zhao","year":"2012","unstructured":"Zhao, X., Zhang, D., Lu, M., Zeng, F.: A new approach to assessment of confidence in assurance cases. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP Workshops 2012. LNCS, vol. 7613, pp. 79\u201391. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24255-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:58:01Z","timestamp":1559239081000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24255-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319242545","9783319242552"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24255-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}