<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Formal Contract Logic Based Patterns for Facilitating Compliance Checking against ISO 26262</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Patricia</forename><surname>Julieth</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Mälardalen University</orgName>
								<address>
									<postBox>Box 883</postBox>
									<postCode>721 23</postCode>
									<settlement>Västerås</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ardila</forename><surname>Castellanos</surname></persName>
							<email>julieth.castellanos@mdh.se</email>
							<affiliation key="aff0">
								<orgName type="institution">Mälardalen University</orgName>
								<address>
									<postBox>Box 883</postBox>
									<postCode>721 23</postCode>
									<settlement>Västerås</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Barbara</forename><surname>Gallina</surname></persName>
							<email>barbara.gallina@mdh.se</email>
							<affiliation key="aff0">
								<orgName type="institution">Mälardalen University</orgName>
								<address>
									<postBox>Box 883</postBox>
									<postCode>721 23</postCode>
									<settlement>Västerås</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Formal Contract Logic Based Patterns for Facilitating Compliance Checking against ISO 26262</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">4B76949570076D127BB6C098D23994F5</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T21:34+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>ISO 26262</term>
					<term>Confirmation review</term>
					<term>Compliance checking</term>
					<term>Formal Contract Logic</term>
					<term>Safety compliance patterns</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>ISO 26262 demands a confirmation review of the safety plan, which includes the compliance checking of planned processes against safety requirements. Formal Contract Logic (FCL), a logic-based language stemming from business compliance, provides means to formalize normative requirements enabling automatic compliance checking. However, formalizing safety requirements in FCL requires skills, which cannot be taken for granted. In this paper, we provide a set of ISO 26262-specific FCL compliance patterns to facilitate rules formalization. First, we identify and define the patterns, based on Dwyer' et al.'s specification patterns style. Then, we instantiate the patterns to illustrate their applicability. Finally, we sketch conclusions and future work.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Safety critical systems designers rely on safety standards, which embody the public consensus of acceptable risk <ref type="bibr" target="#b0">[1]</ref>. Particularly, the automotive industry has adopted the functional safety standard ISO 26262 <ref type="bibr" target="#b1">[2]</ref>, which guides the development of the safetyrelated systems included in a specific class of road vehicles. To claim compliance with ISO 26262 from a process perspective, necessary pieces of evidence are: the safety plan, which is used to manage the execution of safety activities, as well as the corresponding confirmation review, which includes the compliance checking of planned processes against safety requirements. In <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>, we have identified that automatic compliance checking of safety processes involves the definition of a finite state model of the process, where normative safety requirements provides the permissible states of the process elements. This task can be supported with available on the shelf tools. In particular, Formal Contract Logic (FCL) <ref type="bibr" target="#b4">[5]</ref>, a logic-based language stemming from business compliance, provides means to formalize normative requirements. However, formalizing safety requirements in FCL requires skills, which cannot be taken for granted. Patterns, which are "abstractions from concrete forms which keeps recurring in specific non-arbitrary context" <ref type="bibr" target="#b5">[6]</ref>, could represent a solution. In this paper, we follow Dwyer et al.'s specification patterns style <ref type="bibr" target="#b6">[7]</ref>, created to ease the formalization of systems requirements for finite state system model verification, to draw a general definition of safety compliance pattern. We also use specification patterns to identify and define Proceedings of the 1st Workshop on Technologies for Regulatory Compliance a set of ISO 26262-specific FCL compliance patterns. The defined patterns are instantiated to illustrate their applicability. This work will contribute to AMASS project <ref type="bibr" target="#b7">[8]</ref>, in particular, it aims at support the compliance management vision proposed, in which automotive is one of the 11 domains involved <ref type="bibr" target="#b8">[9]</ref>.</p><p>The rest of the paper is organized as follows. In Section 2, we provide essential background. In Section 3, we provide our definition of safety compliance pattern as well as our identified and defined ISO 26262-related patterns. In Section 4, we instantiate the defined safety compliance patterns. In section 5, we present related work. Finally, in Section 6, we present conclusions and future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background</head><p>This section recalls essential information required in our work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">ISO 26262</head><p>ISO 26262 <ref type="bibr" target="#b1">[2]</ref> addresses functional safety in automotive. The safety process influences functional safety. Thus, a confirmation review of the safety plan, which includes the compliance checking of the planned process against safety requirements is mandatory. The safety process can be either strictly planned, i.e., including all the activities provided by the reference process, or flexibly planned, i.e., by tailoring activities (omitting/performing them differently) <ref type="bibr" target="#b9">[10]</ref>. According to ISO 26262:2, if a safety activity is tailored, a) the tailoring shall be defined in the safety plan and b) a rationale as to why the tailoring is adequate and sufficient to achieve functional safety shall be available.</p><p>From a structure perspective, ISO 26262 is divided into parts, which are subdivided into clauses. Some clauses represent phases of the safety process, which also describe activities and tasks. ISO 26262 uses Automotive Safety Integrity Levels (ASIL), which are levels to specify item's necessary safety requirements. Alternative methods to use in the planning of safety activities (e.g., tables) have to be chosen according to the higher recommendation for the ASIL assigned, but if not, a rationale shall be given that the selected methods comply with the corresponding requirement. Disjoint alternatives are also included in the text of the normative requirements. Frequently recurring expressions, which can guide the reading of the standard, can also be found, e.g., in accordance with. In Table <ref type="table" target="#tab_0">1</ref>, we recall a subset of requirements from ISO 26262:6 clause 8, which specifies the software unit design and implementation phase. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ID Ref Description</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>R1 8</head><p>The Software unit design and implementation phase start. R2 8.1 Specify software units in accordance with the architectural design and the associated safety requirements.</p><p>R3 8.2 The detailed design will be implemented as a model or directly as source code.</p><p>R4 8.4.2 The software unit design shall be described using specific notations, which are listed as alternative methods.</p><p>Proceedings of the 1st Workshop on Technologies for Regulatory Compliance</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Specification Patterns</head><p>The specification patterns, formulated by Dwyer et al.'s <ref type="bibr" target="#b6">[7]</ref>, are "generalized descriptions of commonly occurring requirements on the permissible state sequence of a finite state model of a system." A selected set of Dwyer et al.'s patterns is presented in Table <ref type="table" target="#tab_1">2</ref>. The reader may refer to <ref type="bibr" target="#b10">[11]</ref> to see the complete set of patterns with their entire descriptions. Each pattern has a scope, which is the extent of the program execution over which the pattern must hold. The types of scope that we consider in this paper are: global, which represent the entire program execution, before, which includes the execution up to a given state, and after which includes the execution after a given state. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Formal Contract Logic</head><p>Formal Contract Logic (FCL) <ref type="bibr" target="#b4">[5]</ref> is a language designed to formalize normative requirements. FCL is implemented in Regorous, a tool developed by Data61/CSIRO in Australia <ref type="foot" target="#foot_0">1</ref> . An FCL rule is represented as follows:</p><p>r : a 1 , ..., a n ⇒ c, where: a 1 , ..., a n = Conditions of the applicability of the norm. c = Normative effect.</p><p>If a rule has an empty antecedent, it represents the definition of a new term. Otherwise, it represents the triggering of deontic notions, i.e., obligations, situations to which the bearer is legally bounded, or that should avoid, and permissions. If something is permitted the obligation to the contrary does not hold <ref type="bibr" target="#b11">[12]</ref>. In the modeling of the rules, the normative effect requires a notation that clarifies the applicability of the norm (presented in Table <ref type="table">3</ref>). Thus, if an obligation has to be obeyed during all instants of the process interval, it is called maintenance obligation. If achieving the content of the obligation at least once is enough to fulfill it, it is called achievement obligation. An achievement obligation is preemptive if it could be fulfilled even before the obligation is actually in force. Otherwise, it is non-preemptive. If the obligation persists after being violated, it is a perdurant obligation, otherwise is a non-perdurant. A binary relation between rules (&gt;) allows handling rules with conflicting conclusions.</p><p>Table <ref type="table">3</ref>. FCL rule notations <ref type="bibr" target="#b11">[12]</ref> Notation Description</p><p>[P]P P is permitted</p><p>[OM]P There is a maintenance obligation for P</p><p>[OAPP]P There is an achievement, preemptive, and non-perdurant obligation for P</p><p>[OANPP]P There is an achievement, non-preemptive and perdurant obligation for P</p><p>[OAPNP]P There is an achievement, preemptive and non-perdurant obligation for P</p><p>[OANPNP]P There is an achievement, non-preemptive and non-perdurant obligation for P</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Safety Compliance Patterns Identification and Definition</head><p>This section introduces our definition of safety compliance pattern as well as our identified and defined ISO 26262-related compliance patterns.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Our definition of Safety Compliance Pattern</head><p>As recalled in the introduction, automatic compliance checking of safety process involves the definition of a finite state model of the process, where normative safety requirements provide the permissible states of the process elements. This statement allows us to think of a process as a kind of system that can be verified. Thus, we can translate the specification pattern definition (see Section 2.2) into our context as follows: safety compliance patterns are patterns that describe commonly occurring normative safety requirements on the permissible state sequence of a finite state process model. With this definition, we can develop a mapping between specification patterns and safety compliance patterns, as follows: the presence of a state in a system can be interpreted as the state of the obligation imposed to an element in the process, and the scope corresponds to the interval in a process when the obligations formulated by the pattern are in force. In Section 3.2, we identify the safety compliance patterns extracted from ISO 26262.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">ISO 26262-related Compliance Patterns Identification</head><p>For identifying a safety compliance pattern in ISO 26262, we have delineated five methodological steps. The first step consists of the selection of a recurring structure in the standard since, as recalled in Section 2.1, safety requirements in ISO 26262 have implicit and explicit structures. The second step is the description of the obligation for compliance, namely, the reasons why the structure is required for safety compliance. The third step is the pattern description, based on similar (or a combination of) behaviors of the patterns described by Dwyer et al.'s (see Table <ref type="table" target="#tab_1">2</ref>). This description is contextualized to safety compliance, based on the mapping presented in Section 3.1. In this step, we also assign a name for the safety pattern, which reflects the related obligation for compliance. The fourth step is the definition of the scope of the pattern, which we also base on Dwyer et al.'s work. The fifth step is the formalization in FCL. To formalize the pattern, the scope defined for the pattern requires being mapped into the rule notations provided by FCL. Therefore, a global scope, which represents the entire process model execution, can be mapped to maintenance obligation, which represents that</p><p>Proceedings of the 1st Workshop on Technologies for Regulatory Compliance an obligation has to be obeyed during all instants of the process interval. A before scope, which includes the execution of the process model up to a given state, can be mapped to the concept of preemptive obligation, which represents that an obligation could be fulfilled even before it is in force. An after scope, which includes the execution of the process model until a given state, can be mapped to the concept non-preemptive obligation, which represents that an obligation cannot be fulfilled until it is in force. It should be noted that, in safety compliance, it is possible to define exceptions for the rules. Therefore, if the obligation admits an exception, the part of the pattern that corresponds to the exception is described as a permission, since, as recalled in Section 2.3, if something is permitted the obligation to the contrary does not hold. The obligation, to which the exception applies, is modeled as non-perdurant, since the permission is not a violation of the obligation, and therefore the obligation does not persist after the permission is granted. In this case, the obligation and a permission have contradictory conclusions, but the permission is superior since it represent an exception. These methodological steps have helped us to define an initial set of four ISO 26262 -related FCL compliance patterns, presented in Section 3.3. The description of our patterns has information related to the steps mentioned above. Therefore, the corresponding expressions in bold represent the elements of the pattern's description.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">ISO 26262-related Compliance Patterns Definition</head><p>In what follows, we define our safety compliance patterns in ISO 26262.</p><p>Pattern: Address Phase. Recurring structure: A phase. Obligation for compliance: Every phase proposed by the safety model must be addressed. A phase can be omitted if tailoring is performed and a rationale is provided. Pattern description: Universality + absence -A phase must occur. Not addressing the phase requires its tailoring and the provision of a rationale. Scope: Global. FCL mapping: A maintenance obligation address{Phase} is triggered by a previous task {optionalTriggeringObligation}, which can be empty if the phase is checked for compliance in isolation from the other phases. The permission for not addressing the phase requires two antecedents, tailor{Phase} and rationaleForOmiting{Phase} (See Formula 1).</p><formula xml:id="formula_0">r : {optionalTriggeringObligation} ⇒ [OM]address{Phase} r : tailor{Phase}, rationaleForOmiting{Phase} ⇒ [P] − address{Phase} r &gt;r<label>(1)</label></formula><p>Pattern: Perform Preconditions. Structure: The structure implicit in the expression in accordance with. Obligation for compliance: A task is prohibited until the preconditions are performed. Pattern description: Absence + precedence -A given task cannot occur within a scope. The task is permitted to be performed if the preconditions are performed. Scope: After. FCL mapping: A rule triggered by a previous rule {TriggeringObligation} prohibits the performing of the task perform{Task}. The permission of performing perform{Task} is granted after the preconditions are fulfilled perform{Preconditions} (See Formula 2). </p><p>Proceedings of the 1st Workshop on Technologies for Regulatory Compliance Pattern: Select Disjoint Methods. Structure: Structure implicit when the word or is used to list two methods. Obligation for compliance: Only one method can be selected from a list of two. Pattern description: Existence + absence -A given method can be selected within a scope. The presence of a second method derogates the selection of the first method. Scope: After. FCL mapping: A rule triggered by previous obligations {TriggeringObligation} imposes the obligation of selecting a method select{Method1}.</p><p>The selection of a second method select{Method2}, derogates the previous selection select{Method1} (See Formula 3).</p><formula xml:id="formula_2">r : {TriggeringObligation} ⇒ [OANPNP]select{Method1}] r : select{Method2} ⇒ [P] − select{Method1} r &gt;r<label>(3)</label></formula><p>Pattern: Select alternative methods. Structure: Alternative methods given in tables.</p><p>Obligation for compliance: Methods should be selected according to ASIL/recommendation levels. Alternative methods can be selected if a rationale is provided. Pattern description: Response + absence -A given obligation has to occur. The provision of a rationale grants the permission to derogates the obligation. Scope: After. FCL mapping: A rule triggered by previous obligations {TriggeringObligation} imposes the selection of methods according to the requirements select{mandatoryMethods}. The provision of the rationale is the permission that derogates the obligation (See Formula 4).</p><formula xml:id="formula_3">r : {TriggeringObligation} ⇒ [OANPNP]select{mandatoryMethods} r : provideRationaleForNotSelect{mandatoryMethods} ⇒ [P] − select{mandatoryMethods} r &gt;r<label>(4)</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">ISO 26262-related Compliance Patterns Instantiation</head><p>In this section, we instantiate the patterns defined in Section 3.3, using the ISO 26262 requirements presented in Table <ref type="table" target="#tab_0">1</ref>.</p><p>Requirement R1, which defines the phase software unit design and specification, can be specified by using the pattern Address Phase. We assume that the phase is checked in isolation from other phases (See Formula 5). </p><p>Requirement R2 have the expression in accordance with, which can be represented with the pattern Perform Preconditions. Specifically, the software architectural design and the associated safety requirements are preconditions to specify the software units. We assume that the triggering rule is addressSwUnitDesignAndImplementation (See Formula 6). Requirement R3 mentions the use of two disjoint implementation strategies, namely implementation as a model or directly as source code. Therefore, this requirement can be modeled using the pattern Select Disjoint Methods. We assume that the triggering rule is implementingSwUnit (See Formula 7).</p><formula xml:id="formula_5">r 3 : implementingSwUnit ⇒ [OANPNP]selectImplementingAsSourceCode(X) r 3 : selectImplementingAsModel(X) ⇒ [P] − selectImplementingAsSourceCode(X) r 3 &gt;r 3<label>(7)</label></formula><p>Requirement R4 refers to a table with alternative entries. This requirement can be represented by using the pattern Select alternative methods. We assume that the triggering rule is performSpecifySwUnit (See Formula 8). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Related Work</head><p>Patterns for the formal specification of system safety requirements are presented in <ref type="bibr" target="#b12">[13]</ref>. These patterns consider the cases and the terminology used in industrial automation systems to facilitate formal verification. Our patterns, instead, are restricted to processcentered requirements. Some works provide patterns for facilitating the formalization of the normative requirements for compliance checking in areas like business process compliance, e.g., the works presented in <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref> which extends Dwyer et al.'s specification patterns, and the work presented in <ref type="bibr" target="#b15">[16]</ref>, which uses REA (Resources, Events, and Agents) approach. A similar work, in the context of security, is presented in <ref type="bibr" target="#b16">[17]</ref>, which aims at providing a pattern structure for generating security policies for serviceoriented architectures. In our work, as in some of the previously mentioned works, we use Dwyer et al.'s specification patterns as a base for providing our definition for safety compliance pattern. Also, we identified and defined the safety compliance patterns present in some structures of the standard ISO 26262. Moreover, our patterns are formalized in FCL, a formal language that is explicitly created for compliance checking, providing precise structures for modeling, e.g., deontic effects, which facilitate the expression of normative requirements in a more natural way.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion and Future Work</head><p>In this paper, we use Dwyer et al.'s specification patterns style to provide our definition of safety compliance patterns. Also, we identify and define set of ISO 26262-specific FCL compliance patterns, which were extracted from implicit and explicit recurring structures provided by ISO 26262. In the last part of our work, we have instantiated the defined safety compliance patterns, to illustrate their applicability.</p><p>In future, we plan to examine other clauses of ISO 26262 to apply the proposed patterns and discover additional ones. Once a complete catalogue of safety compliance patterns embracing ISO 26262 is ready, we plan to facilitate their instantiation by Proceedings of the 1st Workshop on Technologies for Regulatory Compliance providing more elaborated guidelines. Our work on safety compliance patterns is expected to be combined with previously achieved results <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref> regarding the provision of a framework to increase efficiency and confidence in process compliance management.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>r</head><label></label><figDesc>: {TriggeringObligation} ⇒ [OANPNP] − per f orm{Task} r : per f orm{Precondition1}, ..., per f orm{PreconditionN} ⇒ [P]per f orm{Task} r &gt;r</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>r 1 :</head><label>1</label><figDesc>⇒ [OM]addressSwUnitDesignAndImplementation r 1 : tailorSwUnitDesignAndImplementation, rationaleForOmitingSwDesignAndImplementation ⇒ [P] − addressSwUnitDesignAndImplementation r 1 &gt;r 1</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>r 2 : 2 :</head><label>22</label><figDesc>addressSwUnitDesignAndImplementation ⇒ [OANPNP] − per f ormSpeci f ySwUnit r per f ormProvideSwArchitecturalDesign, per f ormProvideSa f etyRequirements ⇒ [P]per f ormSpeci f ySwUnit{Task} r 2 &gt;r 2 (6)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>r 4 :</head><label>4</label><figDesc>per f ormSpeci f ySwUnit ⇒ [OANPNP]selectMandatoryNotations f orSwDesign r 4 : provideRationaleForNotSelectMandatoryNotations f orSwDesign ⇒ [P] − selectMandatoryNotations f orSwDesign r 4 &gt;r 4 (8)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Requirements for ISO 26262:6 clause 8.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 .</head><label>2</label><figDesc>Dwyer's specification patterns<ref type="bibr" target="#b6">[7]</ref> </figDesc><table /><note>Name Description Absence A given state P does not occur within a scope Existence A given state P must occur within a scope Universality A given state P must occur throughout a scope Precedence A state P must always be preceded by a state Q within a scope Response A state P must always be followed by a state Q within a scope</note></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://research.csiro.au/data61/regorous/.Proceedings of the 1st Workshop on Technologies for Regulatory Compliance</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments. This work is supported by the EU and VINNOVA via the ECSEL JU project AMASS (No. 692474) <ref type="bibr" target="#b7">[8]</ref>.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Designing Safety-Critical Computer Systems</title>
		<author>
			<persName><forename type="first">W</forename><surname>Dunn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="40" to="46" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<idno>ISO 26262</idno>
		<title level="m">Road Vehicles-Functional Safety</title>
				<imprint>
			<publisher>International Standard</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Towards Increased Efficiency and Confidence in Process Compliance</title>
		<author>
			<persName><forename type="first">J</forename><surname>Castellanos Ardila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Gallina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">24th European Conference EuroSPI</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="162" to="174" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Towards Efficiently Checking Compliance Against Automotive Security and Safety Standards</title>
		<author>
			<persName><forename type="first">J</forename><surname>Castellanos Ardila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Gallina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The 7th IEEE International Workshop on Software Certification</title>
				<meeting><address><addrLine>Toulouse, France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Representing business contracts in RuleML</title>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Cooperative Information Systems</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">02n03</biblScope>
			<biblScope unit="page" from="181" to="216" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Understanding and using patterns in software development</title>
		<author>
			<persName><forename type="first">D</forename><surname>Riehle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Züllighoven</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Tapos</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="3" to="13" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Property Specification for Finite-State Verification</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dwyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Avrunin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Corbett</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Software Engineering</title>
				<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="411" to="420" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<ptr target="http://www.amass-ecsel.eu/" />
		<title level="m">AMASS: Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<ptr target="https://www.amass-ecsel.eu/content/deliverables.Technicalreport" />
		<title level="m">AMASS: Case studies description and business impact D1</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">How to increase efficiency with the certification of process compliance</title>
		<author>
			<persName><forename type="first">B</forename><surname>Gallina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The 3rd Scandinavian Conference on Systems &amp; Software Safety</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="http://patterns.projects.cs.ksu.edu/" />
		<title level="m">Specification Patterns</title>
				<imprint/>
	</monogr>
	<note>Santos Laboratory</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Normative requirements for regulatory compliance: An abstract formal framework</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hashmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Governatori</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wynn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Systems Frontiers</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="429" to="455" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Safety patterns-the key to formal specification of safety requirements</title>
		<author>
			<persName><forename type="first">F</forename><surname>Bitsch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Safety, Reliability, and Security</title>
		<imprint>
			<biblScope unit="page" from="176" to="189" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Pattern-Based Design and Validation of Business Process Compliance</title>
		<author>
			<persName><forename type="first">K</forename><surname>Namiri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Stojanovic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">On the Move to Meaningful Internet Systems</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="59" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Formalizing and applying compliance patterns for business process compliance</title>
		<author>
			<persName><forename type="first">A</forename><surname>Elgammal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Turetken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Van Den Heuvel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Papazoglou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Software and Systems Modeling</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="119" to="146" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Formal Analysis of Access Control Policies for Pattern-Based Business Processes</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">R</forename><surname>Karimi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">World Congress on Privacy, Security, Trust and the Management of e-Business</title>
				<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="239" to="242" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A pattern-driven generation of security policies for Service-oriented Architectures</title>
		<author>
			<persName><forename type="first">M</forename><surname>Menzel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Warschofsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Meinel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Web Services</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="243" to="250" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
