<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Formal Contract Logic Based Patterns for Facilitating Compliance Checking against ISO 26262</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Julieth Patricia Castellanos Ardila</string-name>
          <email>julieth.castellanos@mdh.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Barbara Gallina</string-name>
          <email>barbara.gallina@mdh.se</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ma ̈lardalen University</institution>
          ,
          <addr-line>Box 883, 721 23 Va ̈stera ̊s</addr-line>
          ,
          <country country="SE">Sweden</country>
        </aff>
      </contrib-group>
      <fpage>65</fpage>
      <lpage>72</lpage>
      <abstract>
        <p>ISO 26262 demands a confirmation review of the safety plan, which includes the compliance checking of planned processes against safety requirements. Formal Contract Logic (FCL), a logic-based language stemming from business compliance, provides means to formalize normative requirements enabling automatic compliance checking. However, formalizing safety requirements in FCL requires skills, which cannot be taken for granted. In this paper, we provide a set of ISO 26262-specific FCL compliance patterns to facilitate rules formalization. First, we identify and define the patterns, based on Dwyer' et al.'s specification patterns style. Then, we instantiate the patterns to illustrate their applicability. Finally, we sketch conclusions and future work.</p>
      </abstract>
      <kwd-group>
        <kwd>ISO 26262</kwd>
        <kwd>Confirmation review</kwd>
        <kwd>Compliance checking</kwd>
        <kwd>Formal Contract Logic</kwd>
        <kwd>Safety compliance patterns</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Safety critical systems designers rely on safety standards, which embody the public
consensus of acceptable risk [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Particularly, the automotive industry has adopted the
functional safety standard ISO 26262 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], which guides the development of the
safetyrelated systems included in a specific class of road vehicles. To claim compliance with
ISO 26262 from a process perspective, necessary pieces of evidence are: the safety
plan, which is used to manage the execution of safety activities, as well as the
corresponding confirmation review, which includes the compliance checking of planned
processes against safety requirements. In [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], we have identified that automatic
compliance checking of safety processes involves the definition of a finite state model of
the process, where normative safety requirements provides the permissible states of the
process elements. This task can be supported with available on the shelf tools. In
particular, Formal Contract Logic (FCL) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], a logic-based language stemming from business
compliance, provides means to formalize normative requirements. However,
formalizing safety requirements in FCL requires skills, which cannot be taken for granted.
Patterns, which are ”abstractions from concrete forms which keeps recurring in
specific non-arbitrary context” [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], could represent a solution. In this paper, we follow
Dwyer et al.’s specification patterns style [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], created to ease the formalization of
systems requirements for finite state system model verification, to draw a general definition
of safety compliance pattern. We also use specification patterns to identify and define
a set of ISO 26262-specific FCL compliance patterns. The defined patterns are
instantiated to illustrate their applicability. This work will contribute to AMASS project [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ],
in particular, it aims at support the compliance management vision proposed, in which
automotive is one of the 11 domains involved [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>The rest of the paper is organized as follows. In Section 2, we provide essential
background. In Section 3, we provide our definition of safety compliance pattern as well
as our identified and defined ISO 26262-related patterns. In Section 4, we instantiate
the defined safety compliance patterns. In section 5, we present related work. Finally,
in Section 6, we present conclusions and future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>
        This section recalls essential information required in our work.
2.1 ISO 26262
ISO 26262 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] addresses functional safety in automotive. The safety process influences
functional safety. Thus, a confirmation review of the safety plan, which includes the
compliance checking of the planned process against safety requirements is mandatory.
The safety process can be either strictly planned, i.e., including all the activities
provided by the reference process, or flexibly planned, i.e., by tailoring activities
(omitting/performing them differently) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. According to ISO 26262:2, if a safety activity is
tailored, a) the tailoring shall be defined in the safety plan and b) a rationale as to why
the tailoring is adequate and sufficient to achieve functional safety shall be available.
      </p>
      <p>From a structure perspective, ISO 26262 is divided into parts, which are subdivided
into clauses. Some clauses represent phases of the safety process, which also describe
activities and tasks. ISO 26262 uses Automotive Safety Integrity Levels (ASIL), which
are levels to specify item’s necessary safety requirements. Alternative methods to use
in the planning of safety activities (e.g., tables) have to be chosen according to the
higher recommendation for the ASIL assigned, but if not, a rationale shall be given
that the selected methods comply with the corresponding requirement. Disjoint
alternatives are also included in the text of the normative requirements. Frequently recurring
expressions, which can guide the reading of the standard, can also be found, e.g., in
accordance with. In Table 1, we recall a subset of requirements from ISO 26262:6 clause
8, which specifies the software unit design and implementation phase.
2.2</p>
      <sec id="sec-2-1">
        <title>Specification Patterns</title>
        <p>
          The specification patterns, formulated by Dwyer et al.’s [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], are ”generalized
descriptions of commonly occurring requirements on the permissible state sequence of a finite
state model of a system.” A selected set of Dwyer et al.’s patterns is presented in
Table 2. The reader may refer to [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] to see the complete set of patterns with their entire
descriptions. Each pattern has a scope, which is the extent of the program execution
over which the pattern must hold. The types of scope that we consider in this paper
are: global, which represent the entire program execution, before, which includes the
execution up to a given state, and after which includes the execution after a given state.
        </p>
        <p>Name
Absence
Existence
Universality
Precedence
Response
r : a1; :::; an ) c; where:
a1; :::; an = Conditions of the applicability of the norm.</p>
        <p>c = Normative effect.</p>
        <p>
          If a rule has an empty antecedent, it represents the definition of a new term. Otherwise,
it represents the triggering of deontic notions, i.e., obligations, situations to which the
bearer is legally bounded, or that should avoid, and permissions. If something is
permitted the obligation to the contrary does not hold [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. In the modeling of the rules,
the normative effect requires a notation that clarifies the applicability of the norm
(presented in Table 3). Thus, if an obligation has to be obeyed during all instants of the
process interval, it is called maintenance obligation. If achieving the content of the
obligation at least once is enough to fulfill it, it is called achievement obligation. An
achievement obligation is preemptive if it could be fulfilled even before the obligation
is actually in force. Otherwise, it is non-preemptive. If the obligation persists after being
violated, it is a perdurant obligation, otherwise is a non-perdurant. A binary relation
between rules (&gt;) allows handling rules with conflicting conclusions.
1 https://research.csiro.au/data61/regorous/.
This section introduces our definition of safety compliance pattern as well as our
identified and defined ISO 26262-related compliance patterns.
As recalled in the introduction, automatic compliance checking of safety process
involves the definition of a finite state model of the process, where normative safety
requirements provide the permissible states of the process elements. This statement allows
us to think of a process as a kind of system that can be verified. Thus, we can translate
the specification pattern definition (see Section 2.2) into our context as follows: safety
compliance patterns are patterns that describe commonly occurring normative safety
requirements on the permissible state sequence of a finite state process model. With this
definition, we can develop a mapping between specification patterns and safety
compliance patterns, as follows: the presence of a state in a system can be interpreted as the
state of the obligation imposed to an element in the process, and the scope corresponds
to the interval in a process when the obligations formulated by the pattern are in force.
In Section 3.2, we identify the safety compliance patterns extracted from ISO 26262.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>3.2 ISO 26262-related Compliance Patterns Identification</title>
        <p>For identifying a safety compliance pattern in ISO 26262, we have delineated five
methodological steps. The first step consists of the selection of a recurring structure
in the standard since, as recalled in Section 2.1, safety requirements in ISO 26262 have
implicit and explicit structures. The second step is the description of the obligation for
compliance, namely, the reasons why the structure is required for safety compliance.
The third step is the pattern description, based on similar (or a combination of)
behaviors of the patterns described by Dwyer et al.’s (see Table 2). This description is
contextualized to safety compliance, based on the mapping presented in Section 3.1. In
this step, we also assign a name for the safety pattern, which reflects the related
obligation for compliance. The fourth step is the definition of the scope of the pattern, which
we also base on Dwyer et al.’s work. The fifth step is the formalization in FCL. To
formalize the pattern, the scope defined for the pattern requires being mapped into the rule
notations provided by FCL. Therefore, a global scope, which represents the entire
process model execution, can be mapped to maintenance obligation, which represents that
an obligation has to be obeyed during all instants of the process interval. A before scope,
which includes the execution of the process model up to a given state, can be mapped
to the concept of preemptive obligation, which represents that an obligation could be
fulfilled even before it is in force. An after scope, which includes the execution of the
process model until a given state, can be mapped to the concept non-preemptive
obligation, which represents that an obligation cannot be fulfilled until it is in force. It should
be noted that, in safety compliance, it is possible to define exceptions for the rules.
Therefore, if the obligation admits an exception, the part of the pattern that corresponds
to the exception is described as a permission, since, as recalled in Section 2.3, if
something is permitted the obligation to the contrary does not hold. The obligation, to which
the exception applies, is modeled as non-perdurant, since the permission is not a
violation of the obligation, and therefore the obligation does not persist after the permission
is granted. In this case, the obligation and a permission have contradictory conclusions,
but the permission is superior since it represent an exception. These methodological
steps have helped us to define an initial set of four ISO 26262 - related FCL
compliance patterns, presented in Section 3.3. The description of our patterns has information
related to the steps mentioned above. Therefore, the corresponding expressions in bold
represent the elements of the pattern’s description.</p>
      </sec>
      <sec id="sec-2-3">
        <title>3.3 ISO 26262-related Compliance Patterns Definition</title>
        <p>In what follows, we define our safety compliance patterns in ISO 26262.</p>
      </sec>
      <sec id="sec-2-4">
        <title>Pattern: Address Phase. Recurring structure: A phase. Obligation for compliance:</title>
        <p>Every phase proposed by the safety model must be addressed. A phase can be omitted
if tailoring is performed and a rationale is provided. Pattern description: Universality
+ absence - A phase must occur. Not addressing the phase requires its tailoring and
the provision of a rationale. Scope: Global. FCL mapping: A maintenance obligation
addressfPhaseg is triggered by a previous task foptionalTriggeringObligationg, which
can be empty if the phase is checked for compliance in isolation from the other phases.
The permission for not addressing the phase requires two antecedents, tailorfPhaseg
and rationaleForOmitingfPhaseg (See Formula 1).</p>
        <p>r : foptionalTriggeringObligationg ) [OM]addressfPhaseg
r0 : tailorfPhaseg;rationaleForOmitingfPhaseg ) [P] addressfPhaseg
r0&gt;r
Pattern: Perform Preconditions. Structure: The structure implicit in the expression
in accordance with. Obligation for compliance: A task is prohibited until the
preconditions are performed. Pattern description: Absence + precedence - A given task
cannot occur within a scope. The task is permitted to be performed if the
preconditions are performed. Scope: After. FCL mapping: A rule triggered by a previous rule
fTriggeringObligationg prohibits the performing of the task performfTaskg. The
permission of performing performfTaskg is granted after the preconditions are fulfilled
performfPreconditionsg (See Formula 2).</p>
        <p>r : fTriggeringObligationg ) [OANPNP] per f ormfTaskg
r0 : per f ormfPrecondition1g;:::; per f ormfPreconditionNg ) [P]per f ormfTaskg
r0&gt;r
(1)
(2)
Pattern: Select Disjoint Methods. Structure: Structure implicit when the word or is
used to list two methods. Obligation for compliance: Only one method can be selected
from a list of two. Pattern description: Existence + absence - A given method can be
selected within a scope. The presence of a second method derogates the selection of
the first method. Scope: After. FCL mapping: A rule triggered by previous obligations
fTriggeringObligationg imposes the obligation of selecting a method selectfMethod1g.
The selection of a second method selectfMethod2g, derogates the previous selection
selectfMethod1g (See Formula 3).</p>
        <p>r : fTriggeringObligationg ) [OANPNP]selectfMethod1g]
r0 : selectfMethod2g ) [P] selectfMethod1g
r0&gt;r
(3)
(4)
(5)
Pattern: Select alternative methods. Structure: Alternative methods given in tables.
Obligation for compliance: Methods should be selected according to
ASIL/recommendation levels. Alternative methods can be selected if a rationale is provided. Pattern
description: Response + absence - A given obligation has to occur. The provision of
a rationale grants the permission to derogates the obligation. Scope: After. FCL
mapping: A rule triggered by previous obligations fTriggeringObligationg imposes the
selection of methods according to the requirements selectfmandatoryMethodsg. The
provision of the rationale is the permission that derogates the obligation (See Formula 4).</p>
        <p>r : fTriggeringObligationg ) [OANPNP]selectfmandatoryMethodsg
r0 : provideRationaleForNotSelectfmandatoryMethodsg ) [P] selectfmandatoryMethodsg
r0&gt;r
In this section, we instantiate the patterns defined in Section 3.3, using the ISO 26262
requirements presented in Table 1.</p>
        <p>Requirement R1, which defines the phase software unit design and specification, can
be specified by using the pattern Address Phase. We assume that the phase is checked
in isolation from other phases (See Formula 5).</p>
        <p>r1 :) [OM]addressSwUnitDesignAndImplementation
r10 : tailorSwUnitDesignAndImplementation;rationaleForOmitingSwDesignAndImplementation
) [P] addressSwUnitDesignAndImplementation
r10&gt;r1
Requirement R2 have the expression in accordance with, which can be represented
with the pattern Perform Preconditions. Specifically, the software architectural design
and the associated safety requirements are preconditions to specify the software units.
We assume that the triggering rule is addressSwUnitDesignAndImplementation (See
Formula 6).</p>
        <p>r2 : addressSwUnitDesignAndImplementation ) [OANPNP] per f ormSpeci f ySwUnit
r20 : per f ormProvideSwArchitecturalDesign; per f ormProvideSa f etyRequirements ) [P]per f ormSpeci f ySwUnitfTaskg
r20&gt;r2
(6)
Requirement R3 mentions the use of two disjoint implementation strategies, namely
implementation as a model or directly as source code. Therefore, this requirement can
be modeled using the pattern Select Disjoint Methods. We assume that the triggering
rule is implementingSwUnit (See Formula 7).</p>
        <p>r3 : implementingSwUnit ) [OANPNP]selectImplementingAsSourceCode(X)
r30 : selectImplementingAsModel(X) ) [P] selectImplementingAsSourceCode(X)
r30&gt;r3
(7)
Requirement R4 refers to a table with alternative entries. This requirement can be
represented by using the pattern Select alternative methods. We assume that the triggering
rule is performSpecifySwUnit (See Formula 8).</p>
        <p>r4 : per f ormSpeci f ySwUnit ) [OANPNP]selectMandatoryNotations f orSwDesign
r40 : provideRationaleForNotSelectMandatoryNotations f orSwDesign ) [P] selectMandatoryNotations f orSwDesign
r40&gt;r4
(8)
5</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Related Work</title>
      <p>
        Patterns for the formal specification of system safety requirements are presented in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
These patterns consider the cases and the terminology used in industrial automation
systems to facilitate formal verification. Our patterns, instead, are restricted to
processcentered requirements. Some works provide patterns for facilitating the formalization
of the normative requirements for compliance checking in areas like business process
compliance, e.g., the works presented in [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ] which extends Dwyer et al.’s
specification patterns, and the work presented in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], which uses REA (Resources, Events,
and Agents) approach. A similar work, in the context of security, is presented in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ],
which aims at providing a pattern structure for generating security policies for
serviceoriented architectures. In our work, as in some of the previously mentioned works,
we use Dwyer et al.’s specification patterns as a base for providing our definition for
safety compliance pattern. Also, we identified and defined the safety compliance
patterns present in some structures of the standard ISO 26262. Moreover, our patterns are
formalized in FCL, a formal language that is explicitly created for compliance
checking, providing precise structures for modeling, e.g., deontic effects, which facilitate the
expression of normative requirements in a more natural way.
6
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion and Future Work</title>
      <p>In this paper, we use Dwyer et al.’s specification patterns style to provide our definition
of safety compliance patterns. Also, we identify and define set of ISO 26262-specific
FCL compliance patterns, which were extracted from implicit and explicit recurring
structures provided by ISO 26262. In the last part of our work, we have instantiated the
defined safety compliance patterns, to illustrate their applicability.</p>
      <p>
        In future, we plan to examine other clauses of ISO 26262 to apply the proposed
patterns and discover additional ones. Once a complete catalogue of safety
compliance patterns embracing ISO 26262 is ready, we plan to facilitate their instantiation by
providing more elaborated guidelines. Our work on safety compliance patterns is
expected to be combined with previously achieved results [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ] regarding the provision of
a framework to increase efficiency and confidence in process compliance management.
Acknowledgments. This work is supported by the EU and VINNOVA via the ECSEL
JU project AMASS (No. 692474) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Dunn</surname>
          </string-name>
          , W.:
          <article-title>Designing Safety-Critical Computer Systems</article-title>
          . Computer.
          <volume>36</volume>
          (
          <issue>11</issue>
          ) (
          <year>2003</year>
          )
          <fpage>40</fpage>
          -
          <lpage>46</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. ISO 26262:
          <string-name>
            <surname>Road</surname>
            <given-names>Vehicles-Functional</given-names>
          </string-name>
          <string-name>
            <surname>Safety</surname>
          </string-name>
          . International
          <string-name>
            <surname>Standard</surname>
          </string-name>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Castellanos</given-names>
            <surname>Ardila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Gallina</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>Towards Increased Efficiency and Confidence in Process Compliance</article-title>
          .
          <source>In: 24th European Conference EuroSPI</source>
          . (
          <year>2017</year>
          )
          <fpage>162</fpage>
          -
          <lpage>174</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Castellanos</given-names>
            <surname>Ardila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Gallina</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>Towards Efficiently Checking Compliance Against Automotive Security and Safety Standards</article-title>
          .
          <source>In: The 7th IEEE International Workshop on Software Certification</source>
          ., Toulouse, France (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Governatori</surname>
          </string-name>
          , G.:
          <article-title>Representing business contracts in RuleML</article-title>
          .
          <source>International Journal of Cooperative Information Systems</source>
          .
          <volume>14</volume>
          (
          <issue>02n03</issue>
          ) (
          <year>2005</year>
          )
          <fpage>181</fpage>
          -
          <lpage>216</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Riehle</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , Zu¨llighoven, H.:
          <article-title>Understanding and using patterns in software development</article-title>
          .
          <source>Tapos</source>
          <volume>2</volume>
          (
          <issue>1</issue>
          ) (
          <year>1996</year>
          )
          <fpage>3</fpage>
          -
          <lpage>13</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dwyer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Avrunin</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Corbett</surname>
          </string-name>
          , J.:
          <article-title>Property Specification for Finite-State Verification</article-title>
          . In: International Conference on Software Engineering. (
          <year>1998</year>
          )
          <fpage>411</fpage>
          -
          <lpage>420</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. AMASS:
          <article-title>Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems</article-title>
          . http://www.amass-ecsel.eu/
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>AMASS</surname>
          </string-name>
          <article-title>: Case studies description and business impact D1.1</article-title>
          . https://www.amassecsel.eu/content/deliverables.
          <source>Technical report</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Gallina</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>How to increase efficiency with the certification of process compliance</article-title>
          .
          <source>In: The 3rd Scandinavian Conference on Systems &amp; Software Safety</source>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>11. Santos Laboratory: Specification Patterns. http://patterns.projects.cs.ksu.edu/</mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Hashmi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Governatori</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wynn</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Normative requirements for regulatory compliance: An abstract formal framework</article-title>
          .
          <source>Information Systems Frontiers</source>
          .
          <volume>18</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          )
          <fpage>429</fpage>
          -
          <lpage>455</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Bitsch</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Safety patterns-the key to formal specification of safety requirements</article-title>
          .
          <source>Computer Safety</source>
          , Reliability, and Security. (
          <year>2001</year>
          )
          <fpage>176</fpage>
          -
          <lpage>189</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Namiri</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stojanovic</surname>
          </string-name>
          , N.:
          <article-title>Pattern-Based Design and Validation of Business Process Compliance. On the Move to Meaningful Internet Systems</article-title>
          . (
          <year>2007</year>
          )
          <fpage>59</fpage>
          -
          <lpage>76</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Elgammal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turetken</surname>
          </string-name>
          , O., van den Heuvel, W.,
          <string-name>
            <surname>Papazoglou</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Formalizing and applying compliance patterns for business process compliance</article-title>
          .
          <source>Software and Systems Modeling</source>
          .
          <volume>15</volume>
          (
          <issue>1</issue>
          ) (
          <year>2016</year>
          )
          <fpage>119</fpage>
          -
          <lpage>146</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Karimi</surname>
            ,
            <given-names>V.R.</given-names>
          </string-name>
          :
          <article-title>Formal Analysis of Access Control Policies for Pattern-Based Business Processes</article-title>
          . In: World Congress on Privacy, Security, Trust and the Management of e-Business.
          <article-title>(</article-title>
          <year>2009</year>
          )
          <fpage>239</fpage>
          -
          <lpage>242</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Menzel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Warschofsky</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meinel</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>A pattern-driven generation of security policies for Service-oriented Architectures</article-title>
          .
          <source>In: IEEE International Conference on Web Services</source>
          . (
          <year>2010</year>
          )
          <fpage>243</fpage>
          -
          <lpage>250</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>