{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T17:24:10Z","timestamp":1725816250834},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319152004"},{"type":"electronic","value":"9783319152011"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15201-1_6","type":"book-chapter","created":{"date-parts":[[2015,1,31]],"date-time":"2015-01-31T14:31:11Z","timestamp":1422714671000},"page":"86-100","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modelling and Verification of Survivability Requirements for Critical Systems"],"prefix":"10.1007","author":[{"given":"Simona","family":"Bernardi","sequence":"first","affiliation":[]},{"given":"Lacramioara","family":"Dranca","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Merseguer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,1]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2003.1159030","volume":"20","author":"I Alexander","year":"2003","unstructured":"Alexander, I.: Misuse cases: use cases with hostile intent. IEEE Softw. 20(1), 58\u201366 (2003)","journal-title":"IEEE Softw."},{"key":"6_CR2","unstructured":"Allenby, K., Kelly, K.: Deriving safety requirements using scenarios. In: International Conference on Requirements Engineering, pp. 228\u2013235. IEEE Computer Society (2001)"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"01","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 01(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"6_CR4","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1145\/5397.5399","volume":"8","author":"EM Clarke","year":"1986","unstructured":"Clarke, E.M., Emerson, E.A., Sistla, A.P.: Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8(2), 244\u2013263 (1986)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.jss.2005.03.011","volume":"79","author":"P Donzelli","year":"2006","unstructured":"Donzelli, P., Basili, V.: A practical framework for eliciting and modeling system dependability requirements: experience from the NASA high dependability computing project. J. Syst. Softw. 79, 107\u2013119 (2006)","journal-title":"J. Syst. Softw."},{"key":"6_CR6","first-page":"23","volume":"5","author":"LD Diedrichsen","year":"2000","unstructured":"Diedrichsen, L.D.: Command & Control operational requirements and system implementation. Inf. Secur. Int. J. 5, 23\u201340 (2000)","journal-title":"Inf. Secur. Int. J."},{"issue":"4","key":"6_CR7","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/52.776952","volume":"16","author":"RJ Ellison","year":"1999","unstructured":"Ellison, R.J., Linger, R.C., Longstaff, T., Mead, N.R.: Survivable network system analysis: a case study. IEEE Softw. 16(4), 70\u201377 (1999)","journal-title":"IEEE Softw."},{"key":"6_CR8","unstructured":"Girault, C., Valle, R. (eds.): System Engineering: A Petri Net Based Approach to Modelling, Verification and Implementation, Chapter: State Space Based Methods and Model Checking, pp. 171\u2013190. KRONOS (1998)"},{"issue":"2","key":"6_CR9","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.ress.2005.11.060","volume":"92","author":"F Iwu","year":"2007","unstructured":"Iwu, F., Galloway, A., McDermid, J., Toyn, J.: Integrating safety and formal analyses using UML and PFS. Reliab. Eng. Syst. Saf. 92(2), 156\u2013170 (2007)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"6_CR10","volume-title":"The Unified Software Development Process","author":"I Jacobson","year":"1999","unstructured":"Jacobson, I., Booch, G., Rumbaugh, J.: The Unified Software Development Process. Addison Wesley, Reading (1999)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-540-25939-8_3","volume-title":"Architecting Dependable Systems II","author":"JC Knight","year":"2004","unstructured":"Knight, J.C., Strunk, E.A.: Achieving critical system survivability through software architectures. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems II. LNCS, vol. 3069, pp. 51\u201378. Springer, Heidelberg (2004)"},{"key":"6_CR12","volume-title":"The Rational Unified Process: An Introduction","author":"P Kruchten","year":"2003","unstructured":"Kruchten, P.: The Rational Unified Process: An Introduction. Addison-Wesley Longman Publishing, Boston (2003)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Mustafiz, S., Kienzle, J., Berlizev, A.: Addressing degraded service outcomes and exceptional modes of operation in behavioural models. In: Proceedings of the RISE\/EFTS Joint International Workshop on Software Engineering for Resilient Systems, SERENE 2008, pp. 19\u201328. ACM, New York (2008)","DOI":"10.1145\/1479772.1479776"},{"issue":"1","key":"6_CR14","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/0304-3975(81)90110-9","volume":"13","author":"A Pnueli","year":"1981","unstructured":"Pnueli, A.: The temporal semantics of concurrent programs. Theor. Comput. Sci. 13(1), 45\u201360 (1981)","journal-title":"Theor. Comput. Sci."},{"key":"6_CR15","series-title":"EATCS Monographs on Theoretical Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69968-9","volume-title":"Petri Nets. An Introduction","author":"W Reisig","year":"1985","unstructured":"Reisig, W.: Petri Nets. An Introduction. EATCS Monographs on Theoretical Computer Science. Springer, Heidelberg (1985)"},{"key":"6_CR16","volume-title":"The Unified Modeling Language Reference Manual","author":"J Rumbaugh","year":"2004","unstructured":"Rumbaugh, J., Jacobson, I., Booch, G.: The Unified Modeling Language Reference Manual, 2nd edn. Addison Wesley, Reading (2004)","edition":"2"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/3-540-63166-6_51","volume-title":"Computer Aided Verification","author":"K Varpaaniemi","year":"1997","unstructured":"Varpaaniemi, K., Heljanko, K., Lilius, J.: PROD 3.2 \u2014 an advanced tool for efficient reachability analysis. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254, pp. 472\u2013475. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15201-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T05:42:21Z","timestamp":1674279741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15201-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319152004","9783319152011"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15201-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 February 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}