{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T22:33:07Z","timestamp":1724970787203},"reference-count":121,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1741781","CCF-1649448","CCF-1513717"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002428","name":"Austrian Science Fund","doi-asserted-by":"publisher","award":["FWF J3998-N31"],"id":[{"id":"10.13039\/501100002428","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2021,5,1]]},"DOI":"10.1109\/tse.2019.2907595","type":"journal-article","created":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T23:14:43Z","timestamp":1553642083000},"page":"899-918","source":"Crossref","is-referenced-by-count":15,"title":["Interlocking Safety Cases for Unmanned Autonomous Systems in Shared Airspaces"],"prefix":"10.1109","volume":"47","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2672-9230","authenticated-orcid":false,"given":"Michael","family":"Vierhauser","sequence":"first","affiliation":[]},{"given":"Sean","family":"Bayley","sequence":"additional","affiliation":[]},{"given":"Jane","family":"Wyngaard","sequence":"additional","affiliation":[]},{"given":"Wandi","family":"Xiong","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8474-5290","authenticated-orcid":false,"given":"Jinghui","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4409-4702","authenticated-orcid":false,"given":"Joshua","family":"Huseman","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5390-7982","authenticated-orcid":false,"given":"Robyn","family":"Lutz","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9436-5606","authenticated-orcid":false,"given":"Jane","family":"Cleland-Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.08.005"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2017.18"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.07.008"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0017737"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19249-9_3"},{"key":"ref30","author":"jackson","year":"2001","journal-title":"Problem Frames Analyzing and Structuring Software Development Problems"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2017.19"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2003.808865"},{"key":"ref35","article-title":"A continuous-time model of an autonomous aerial vehicle to inform and validate formal verification methods","author":"ireland","year":"2016","journal-title":"arXiv preprint arXiv 1609 04802"},{"key":"ref34","first-page":"307","author":"brunel","year":"2012","journal-title":"Formal Verification of a Safety Argumentation and Application to a Complex UAV System"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.17"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4271\/2011-01-2688"},{"key":"ref29","author":"van lamsweerde","year":"2009","journal-title":"Requirements Engineering From System Goals to UML Models to Software Specifications"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018929719710"},{"key":"ref22","article-title":"ASCAD (Adelard Safety Case Development) manual","year":"1998"},{"key":"ref21","article-title":"Structured assurance case metamodel (SACM version 2.0)","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2016.7778077"},{"key":"ref23","article-title":"Flight standards information management system (FSIMS)","year":"0"},{"key":"ref101","article-title":"Drones for disaster response and relief operations","year":"2015"},{"key":"ref26","article-title":"Intelligent hardware-enabled sensor and software safety and health management for autonomous UAS","year":"2015"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2009.132"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS20050.2012.6299215"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2845-6.ch006"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-005-6825-4"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00034"},{"key":"ref58","year":"2017"},{"key":"ref57","year":"2017"},{"key":"ref56","first-page":"2502","article-title":"The beta reputation system","author":"j\u00f8sang","year":"2002","journal-title":"Proc 15th Bled Electron Commerce Conf"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-006-5952-x"},{"key":"ref54","article-title":"A robust reputation system for mobile ad-hoc networks","author":"buchegger","year":"2003"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544806"},{"key":"ref52","first-page":"241","article-title":"Bootstrapping trust evaluations through stereotypes","author":"burnett","year":"2010","journal-title":"Proc 9th Int Conf Auton Agents Multiagent Syst"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0394.2008.00452.x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1186\/s40327-015-0029-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3354\/meps11945"},{"key":"ref6","article-title":"Special rule for model aircraft section 336","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2014.6943245"},{"key":"ref8","article-title":"Drone sightings and close encounters","year":"2017"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66972-4_13"},{"key":"ref7","article-title":"Unmanned Aircraft System (UAS) Traffic Management (UTM)","year":"2019"},{"key":"ref9","article-title":"UAS sightings reports","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.12.034"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28901-1"},{"key":"ref48","article-title":"Human-robot interactions: Model-based risk analysis and safety case construction","author":"do hoang","year":"2012","journal-title":"Proc Embedded Real Time Softw Syst"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.199"},{"key":"ref42","article-title":"Object Constraint Language - OCL - Version 2.4","year":"0"},{"key":"ref41","article-title":"GSN community standard version 1","author":"attwood","year":"0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2009.12.014"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2012.12.001"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45477-1_5"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2335995"},{"key":"ref71","article-title":"Principled construction of software safety cases","author":"hawkins","year":"2013","journal-title":"Proc Next Generation Syst Assurance Approaches Saf -Critical Syst WS 32nd Int Conf Comput Saf Rel Secur"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2010.26"},{"key":"ref76","article-title":"Concepts and principles of compositional safety cases, COMSA\/2001\/1\/1","author":"kelly","year":"2001"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24255-2_24"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ASSURE.2013.6614268"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2014.72"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20070454"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381825"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2015.12.021"},{"key":"ref62","first-page":"417","article-title":"Lessons from the North Sea: Should ”safety cases” come to America?","volume":"38","author":"steinzor","year":"2011","journal-title":"Boston College Environmental Affairs Law Review"},{"key":"ref61","article-title":"The use of safety cases in certification and regulation","author":"leveson","year":"2011"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2016.09.014"},{"key":"ref64","first-page":"15","article-title":"Representing confidence in assurance case evidence","author":"duan","year":"2014","journal-title":"Proc Int Conf Comput Saf Rel Secur"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3195836.3195838"},{"key":"ref66","article-title":"SITL Simulator","year":"2017"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33675-1_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.11"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-133-2_1"},{"key":"ref1","article-title":"ICAO Cir 328, Unmanned Aircraft Systems (UAS)","year":"2012"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1111\/j.1934-6093.1999.tb00014.x"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08422-0_35"},{"key":"ref108","first-page":"6402","article-title":"Sense and avoid for unmanned aerial vehicles using ADS-B","author":"lin","year":"2015","journal-title":"Proc IEEE Int Conf Robot Autom"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-016-9576-y"},{"key":"ref107","article-title":"A compact phased array radar for UAS sense and avoid","author":"spencer","year":"2015"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.35"},{"key":"ref106","article-title":"DJI GO app now includes GEO geofencing system","year":"2016"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2976767.2976792"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.4172\/2168-9792.1000140"},{"key":"ref91","first-page":"21","article-title":"Runtime verification","author":"rushby","year":"2008"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.5028\/jatm.v9i2.701"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-003-0117-6"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1080\/19475705.2016.1238852"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2017.3957"},{"key":"ref111","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1016\/j.ast.2016.05.020","article-title":"LIDAR obstacle warning and avoidance system for unmanned aerial vehicle sense-and-avoid","volume":"55","author":"subramanian","year":"2016","journal-title":"Aerosp Sci Technol"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MetroAeroSpace.2017.7999533"},{"key":"ref110","first-page":"105","article-title":"Computer vision onboard UAVs for civilian tasks","author":"campoy","year":"2008","journal-title":"Unmanned aircraft systems"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.52"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2012.2206473"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-017-0275-x"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.53"},{"key":"ref10","year":"2017"},{"key":"ref11","article-title":"The goal structuring notation – A safety argument notation","author":"kelly","year":"2004","journal-title":"Proc Depend Syst Netw Work Assur Cases"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2015.25"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-006-0039-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-912-1_7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2011.35"},{"key":"ref118","first-page":"1551","article-title":"Formal trust model for multiagent systems","volume":"7","author":"wang","year":"2007","journal-title":"Proc 20th Int Joint Conf Artif Intell"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33678-2_26"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2017.14"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.71"},{"key":"ref17","author":"leveson","year":"1995","journal-title":"Safeware System Safety and Computers"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2015.2462720"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1999.781056"},{"key":"ref84","first-page":"206","article-title":"Software certification: Is there a case against safety cases?","author":"wassyng","year":"2010","journal-title":"Proc Monterey Workshop"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888904000116"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220578"},{"key":"ref83","article-title":"Arguing safety: A systematic approach to managing safety cases","author":"kelly","year":"1999"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10506-2_18"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-009-9079-8"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/1082473.1082548"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66266-4_11"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2017.3"},{"key":"ref120","article-title":"Socio-cognitive theory of trust","author":"castelfranchi","year":"0"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2738640"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994181"},{"key":"ref85","first-page":"337","article-title":"New standards for trustworthy cyber-physical systems","author":"wassyng","year":"2016","journal-title":"Trustworthy Cyber-Physical Systems Engineering"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.03.001"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.07.034"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19216-1_30"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/32\/9430779\/8674543-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9430779\/08674543.pdf?arnumber=8674543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:50:08Z","timestamp":1652194208000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8674543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,1]]},"references-count":121,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tse.2019.2907595","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,1]]}}}