|
A. Ayoub, J. Chang, O. Sokolsky, and I. Lee, “Assessing the Overall Sufficiency of Safety Arguments,” in Safety-Critical Systems Symposium, SSS'13, Bristol, Uk, 2013
|
|
A. Ayoub, B. G. Kim, I. Lee, and O. Sokolsky, “A Systematic Approach to Justifying Sufficient Confidence in Software Safety Arguments,” Computer Safety, Reliability, and Security, Springer Berlin Heidelberg, pp. 305-316, 2012
|
|
L. Cyra and J. Górski, “Support for Argument Structures Review and Assessment,” Reliability Engineering & System Safety, vol. 96, no. 1, pp. 26-37, 2011
|
|
E. Denney, G. Pai, and I. Habli, "Towards Measurement of Confidence in Safety Cases," in 2011 International Symposium on Empirical Software Engineering and Measurement, pp. 380-383, 2011
|
|
L. Duan, S. Rayadurgam, M. Heimdahl, and O. Sokolsky, “Representation of Confidence in Assurance Cases Using the Beta Distribution,” in IEEE International Symposium on High Assurance Systems Engineering, pp. 86-93, 2016
|
|
L. Duan, S. Rayadurgam, M. Heimdahl, O. Sokolsky, and I. Lee, “Representing Confidence in Assurance Case Evidence,” Computer Safety, Reliability, and Security, Springer International Publishing, pp. 15-26, 2015
|
|
Goal Structuring Notation Working Group, “GSN Community Standard Version 1,” http://www.goalstructuringnotation.info/, 2011.
|
|
J. Goodenough, C. B. Weinstock, and A. Z. Klein, “Toward a Theory of Assurance Case Confidence,” Technical Report, Carnegie Mellon University, 2012
|
|
J. Goodenough, C. B. Weinstock, and A. Z. Klein, “Eliminative Argumentation: A Basis for Arguing Confidence in System Properties,” Technical Report, Carnegie Mellon University, 2015
|
|
P. J. Graydon and C. M. Holloway, “An Investigation of Proposed Techniques for Quantifying Confidence in Assurance Arguments,” Safety Science, vol. 92, pp. 53-65, 2016
|
|
P. J. Graydon and C. M. Holloway, “Defining Baconian Probability for Use in Assurance Argumentation,” Technical Report, NASA, 2016.
|
|
J. Guiochet, Q. A. D. Hoang, and M. Kaaniche, “A Model for Safety Case Confidence Assessment,” International Conference on Computer Safety, Reliability, and Security, pp. 313-327, 2015
|
|
R. Hawkins, T. Kelly, J. Knight, and P. Graydon, “A New Approach to Creating Clear Safety Arguments,” in Advances in Systems Safety , pp. 3-23 2011
|
|
C. Hobbs and M. Lloyd, “The Application of Bayesian Belief Networks to Assurance Case Preparation,” Achieving Systems Safety, Springer London, 2012, pp. 159-176.
|
|
A. J?sang, “Subjective Logic,” Springer International Publishing, 2016
|
|
S. Kokoska and D. Zwillinger, “CRC Standard Probability and Statistics Tables and Formulae, Student Edition,” Taylor & Francis, 2000
|
|
C. I. Menon, R. Hawkins, and J. Mcdermid, “Defence Standard 00-56 Issue 4: Towards Evidence-Based Safety Standards,” Safety-Critical Systems: Problems, Process and Practice, pp. 223-243, 2013
|
|
S. Nair, N. Walkinshaw, T. Kelly, and J. L. D. L. Vara, “An Evidential Reasoning Approach for Assessing Confidence in Safety Evidence,” in International Symposium on Software Reliability Engineering, pp. 541-552, 2015
|
|
Object Management Group, “Structured Assurance Case Metamodel (SACM),” OMG Document Number: formal/2015-07-01. Object Management Group, 2015
|
|
RTCA DO-178C, Software Considerations in Airborne Systems and Equipment Certification, RATC, Inc, 2011.
|
|
G. Shafer, “A Mathematical Theory of Evidence,” Princeton University Press, 1976
|
|
R. Wang, J. Guiochet, and G. Motet, “A Framework for Assessing Safety Argumentation Confidence,” Software Engineering for Resilient Systems, pp.3-12, 2016.
|
|
R. Wang, J. Guiochet, G. Motet, and W. Sch?n, “D-S Theory for Argument Confidence Assessment,” International Conference on Belief Functions, Springer International Publishing, 2016.
|
|
J. Wu, S. Ali, T. Yue, and J. Tian, “Experience Report: Assessing the Reliability of An Industrial Avionics Software: Results, Insights and Recommendations,” in IEEE International Symposium on Software Reliability Engineering, pp. 218-227, 2013
|
|
S. Yamamoto, “Assuring Security through Attribute GSN,” in International Conference on It Convergence and Security, 2015, pp. 1-5.
|
|
F. Zeng, L. U. Manyan, and D. Zhong, “Using D-S Evidence Theory to Evaluation of Confidence in Safety Case,” Journal of Theoretical & Applied Information Technology, 2013.
|
|
X. Zhao, D. Zhang, M. Lu, and F. Zeng, “A New Approach to Assessment of Confidence in Assurance Cases,” in International Conference on Computer Safety, Reliability, and Security, pp. 79-91, 2012
|