{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:17:22Z","timestamp":1725790642084},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319058429"},{"type":"electronic","value":"9783319058436"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05843-6_23","type":"book-chapter","created":{"date-parts":[[2014,3,18]],"date-time":"2014-03-18T01:05:28Z","timestamp":1395104728000},"page":"309-324","source":"Crossref","is-referenced-by-count":11,"title":["Safety Evidence Traceability: Problem Analysis and Model"],"prefix":"10.1007","author":[{"given":"Sunil","family":"Nair","sequence":"first","affiliation":[]},{"given":"Jose Luis","family":"de la Vara","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Melzi","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Tagliaferri","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"de-la-Beaujardiere","sequence":"additional","affiliation":[]},{"given":"Fabien","family":"Belmonte","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Nair, S., et al.: Classification, Structuring, and Assessment of Evidence For Safety: A Systematic Literature Review. In: ICST, pp. 94\u2013103 (2013)","DOI":"10.1109\/ICST.2013.30"},{"key":"23_CR2","unstructured":"IEEE: IEEE Standard Glossary of Software Engineering Terminology, Std. 610.12-1990"},{"key":"23_CR3","unstructured":"Alexander, R., Kelly, T., Gorry, B.: Safety Lifecycle Activities for Autonomous Systems Development. In: SEAS\/TR\/2009\/2 (2009)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-642-28714-5_16","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"J. Cleland-Huang","year":"2012","unstructured":"Cleland-Huang, J., Heimdahl, M., Huffman Hayes, J., Lutz, R., Maeder, P.: Trace queries for safety requirements in high assurance systems. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol.\u00a07195, pp. 179\u2013193. Springer, Heidelberg (2012)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Habli, I., Kelly, T.: A model-driven approach to assuring process reliability. In: ISSRE 2008, pp. 7\u201316 (2008)","DOI":"10.1109\/ISSRE.2008.19"},{"key":"23_CR6","unstructured":"Nair, S., et al.: The State of the Practice on Evidence Management for Compliance with Safety Standards. Simula Research Lab. Technical Report (2013)"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-41533-3_5","volume-title":"Model-Driven Engineering Languages and Systems","author":"J.L. Vara de la","year":"2013","unstructured":"de la Vara, J.L., Panesar-Walawege, R.K.: SafetyMet: A metamodel for safety standards. In: Moreira, A., Sch\u00e4tz, B., Gray, J., Vallecillo, A., Clarke, P. (eds.) MODELS 2013. LNCS, vol.\u00a08107, pp. 69\u201386. Springer, Heidelberg (2013)"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Cleland-Huang, J., et al.: Software and systems traceability. Springer-Verlag New York Incorporated (2012)","DOI":"10.1007\/978-1-4471-2239-5"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Nair, S., De la Vara, J.L., Sen, S.: A Review of Traceability Research at the Requirements Engineering Conference. In: RE (2013)","DOI":"10.1109\/RE.2013.6636722"},{"issue":"3","key":"23_CR10","first-page":"1","volume":"22","author":"R. Torkar","year":"2012","unstructured":"Torkar, R., et al.: Requirements traceability: a systematic literature review and industry case study. IJSEKE\u00a022(3), 1\u201349 (2012)","journal-title":"IJSEKE"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Regan, G., et al.: Traceability-Why do it? In: SPICE 2012, pp. 161\u2013172 (2012)","DOI":"10.1007\/978-3-642-30439-2_15"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Regan, G., et al.: The Barriers to Traceability and their Potential Solutions: Towards a Reference Framework. In: SEAA 2012, pp. 319\u2013322 (2012)","DOI":"10.1109\/SEAA.2012.80"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Gotel, O., Cleland-Huang, J., Hayes, H., Zisman, A., Egyed, A., Grunbacher, P., Antoniol, G.: The quest for Ubiquity: A roadmap for software and systems traceability research. In: 2012 20th IEEE International Requirements Engineering Conference (RE), pp. 71\u201380. IEEE (2012)","DOI":"10.1109\/RE.2012.6345841"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1142\/9789812775245_0014","volume":"3","author":"G. Spanoudakis","year":"2005","unstructured":"Spanoudakis, G., Zisman, A.: Software traceability: a roadmap. Handbook of Software Engineering and Knowledge Engineering\u00a03, 395\u2013428 (2005)","journal-title":"Handbook of Software Engineering and Knowledge Engineering"},{"key":"23_CR15","unstructured":"Pohl, K.: Requirements engineering: fundamentals, principles, and techniques. Springer Publishing Company, Incorporated (2010)"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1016\/j.jss.2009.08.022","volume":"83","author":"J.S. Lee","year":"2010","unstructured":"Lee, J.S., et al.: Means-ends and whole-part traceability analysis of safety requirements. Journal of Systems and Software\u00a083, 1612\u20131621 (2010)","journal-title":"Journal of Systems and Software"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-540-39878-3_24","volume-title":"Computer Safety, Reliability, and Security","author":"P.A.J. Mason","year":"2003","unstructured":"Mason, P.A.J., Saeed, A., Riddle, S.: On the role of traceability for standards compliance: Tracking requirements to code. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol.\u00a02788, pp. 303\u2013316. Springer, Heidelberg (2003)"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-75101-4_1","volume-title":"Computer Safety, Reliability, and Security","author":"W. Ridderhof","year":"2007","unstructured":"Ridderhof, W., Gross, H.-G., Doerr, H.: Establishing evidence for safety cases in automotive systems\u2013A case study. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol.\u00a04680, pp. 1\u201313. Springer, Heidelberg (2007)"},{"key":"23_CR19","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.infsof.2012.01.005","volume":"54","author":"S. Nejati","year":"2012","unstructured":"Nejati, S., et al.: A SysML-based approach to traceability management and design slicing in support of safety certification: Framework, tool support, and case studies. Information and Software Technology\u00a054, 569\u2013590 (2012)","journal-title":"Information and Software Technology"},{"key":"23_CR20","unstructured":"Katta, V., Stalhane, T.: A conceptual model of traceability for safety systems. In: CSDM-Poster Presentation (2010)"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10270-010-0164-x","volume":"10","author":"G. Zoughbi","year":"2011","unstructured":"Zoughbi, G., Briand, L., Labiche, Y.: Modeling safety and airworthiness (RTCA DO-178B) information: conceptual model and UML profile. Software & Systems Modeling\u00a010, 337\u2013367 (2011)","journal-title":"Software & Systems Modeling"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Born, M., et al.: Application of ISO DIS 26262 in practice. In: CARS 2010, pp. 3\u20136 (2010)","DOI":"10.1145\/1772643.1772645"},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MS.2012.26","volume":"29","author":"P. Graydon","year":"2012","unstructured":"Graydon, P., Habli, I., Hawkins, R., Kelly, T., Knight, J.: Arguing Conformance. IEEE Software\u00a029, 50\u201357 (2012)","journal-title":"IEEE Software"},{"key":"23_CR24","unstructured":"OMG: Structured Assurance Case Metamodel (SACM) (2013)"},{"issue":"5","key":"23_CR25","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1016\/j.infsof.2012.11.009","volume":"55","author":"R.K. Panesar-Walawege","year":"2012","unstructured":"Panesar-Walawege, R.K., et al.: Supporting the Verification of Compliance to Safety Standards via Model-Driven Engineering: Approach, Tool-Support and Empirical Validation. Information and Software Technology\u00a055(5), 836\u2013864 (2012)","journal-title":"Information and Software Technology"},{"key":"23_CR26","unstructured":"Sun, L., Kelly, T.: Elaborating the Concept of Evidence in Safety Cases. In: SCSC 2013 (2013)"},{"key":"23_CR27","unstructured":"RTCA: DO-178C - Software Considerations in Airborne Systems and Equipment (2012)"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"De la Vara, J.L., et al.: Towards a model-based evolutionary chain of evidence for compliance with safety standards. In: SAFECOMP 2012 Workshops, pp. 64\u201378 (2012)","DOI":"10.1007\/978-3-642-33675-1_6"},{"key":"23_CR29","unstructured":"Oxford Dictionaries (online), \n \n http:\/\/oxforddictionaries.com"},{"key":"23_CR30","unstructured":"Oliv\u00e9, A.: Conceptual Modeling of Information Systems. Springer (2007)"},{"key":"23_CR31","unstructured":"ISO: International Standard Road vehicles - Functional safety - ISO\/DIS 26262 (2011)"},{"key":"23_CR32","unstructured":"CENELEC: Railway applications - Communications, signalling and processing systems - Software for railway control and protection systems - EN 50128 (2011)"},{"key":"23_CR33","unstructured":"Leveson, N.: The Use of Safety Cases in Certification and Regulation. Journal of System Safety\u00a047 (2011)"},{"key":"23_CR34","unstructured":"OPENCOSS: D1.2 \u2013 Use case description and business impact (2012)"},{"key":"23_CR35","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MS.2006.147","volume":"23","author":"T. Gorschek","year":"2006","unstructured":"Gorschek, T., et al.: A model for technology transfer in practice. IEEE Software\u00a023, 88\u201395 (2006)","journal-title":"IEEE Software"},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Gotel, O., et al.: The quest for Ubiquity: A roadmap for software and systems traceability research. In: RE 2012, pp. 71\u201380 (2012)","DOI":"10.1109\/RE.2012.6345841"},{"issue":"3","key":"23_CR37","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2013.60","volume":"30","author":"P. M\u00e4der","year":"2013","unstructured":"M\u00e4der, P., Jones, P., Zhang, Y., Cleland-Huang, J.: Strategic Traceability for Safety-Critical Projects. IEEE Software\u00a030(3), 58\u201366 (2013)","journal-title":"IEEE Software"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05843-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T11:46:59Z","timestamp":1558871219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-05843-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319058429","9783319058436"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05843-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}