<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Integrating Goal Oriented Requirements Modeling and Safety Analysis with RESafety</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Moniky Ribeiro</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jaelson Castro</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ricardo Argenton</string-name>
          <email>ricardo.aramos@univasf.edu.br</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maria Lencastre</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Abimael Santos</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oscar Pastor</string-name>
          <email>opastor@dsic.upv.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universidad Politécnica de Valencia</institution>
          ,
          <addr-line>Camí de Vera, s/n, 46022 València- Valencia</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universidade Federal de Pernambuco</institution>
          ,
          <addr-line>Av. Prof. Moraes Rego, 1235 - Cidade Universitária, Recife - PE</addr-line>
          ,
          <country country="BR">Brazil</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Universidade Federal do Vale do São Francisco, Av. José de Sá Maniçoba - Centro</institution>
          ,
          <addr-line>Petrolina - PE</addr-line>
          ,
          <country country="BR">Brazil</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Universidade de Pernambuco</institution>
          ,
          <addr-line>Agamenon Magalhães, S/N - Santo Amaro, Recife - PE</addr-line>
          ,
          <country country="BR">Brazil</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Safety properties of Critical Systems must be identified and modeled as early as possible. Yet, the Requirements Engineering and Safety Engineering communities often do not make efforts to integrate their best practices. Therefore, it is worth considering the alignment of new goal-oriented safety requirements modeling languages with modern safety analysis approaches. The goal of this research is to propose a new approach, called RESafety, that aligns early safety requirements modeled in iStar4Safety language with safety elements identified through STPA (System-Theoretic Process Analysis), a system approach to hazard analysis.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Goal Oriented Requirements Modeling</kwd>
        <kwd>Safety-Critical Systems</kwd>
        <kwd>iStar4Safety</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Background and Motivation</title>
      <p>
        Safety Critical Systems (SCSs) are considered systems that, if they fail or behave unexpectedly,
can lead to accidents that may damage people, environment property, as well as may cause loss
of life or finance [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Safety must be considered since the beginning of the SCS development
process until the end of its useful life [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Safety is an emergent property, therefore the safety of a
system is more than safety of its components. It should consider the safety of its interfaces and
the safety of complex interactions between system´s components and people[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Unfortunately,
classic safety analysis approaches like HAZOP, FTA, and FMEA do not consider safety an emergent
property. Moreover, these approaches were formulated when computing systems did not yet
exist [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In contrast, the STPA technique regards safety as an emergent property [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Requirements Engineering is one of the most crucial phases for the development of quality
systems, as unclear or missing requirements can negatively impact the quality of the Technical
Social System [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. GORE (Goal-Oriented Requirements Engineering) is commonly used in the
early requirements phase [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Goal-oriented languages such as iStar, KAOS, and GRL can be used
to organize and justify software requirements, especially in the early stages. iStar has gained
widespread interest in the requirements community and has over a hundred extensions [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
iStar4Safety, adds concepts related to Preliminary Safety Analysis [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        The goal of our research is to promote safety analysis during the early stages of
development to identify and model safety requirements as early as possible. In this paper we
report on the development of the RESafety approach. This ongoing project intends to align the
iStar4Safety language, which is used during the early phase requirements, with the STPA safety
analysis technique [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Goal modeling for Safety Critical Systems</title>
      <p>It is crucial to pay close attention to the requirements phase when dealing with Safety-Critical
Systems. Ensuring that the specifications are correct and accurate is essential, as many mistakes
in requirements can lead to disasters.</p>
      <p>
        GORE languages aim to improve the understanding and communication of requirements
among stakeholders and facilitate the development of systems that meet their goals and
expectations. By emphasizing goals, it allows for a broader perspective of the system and
stakeholder needs, reducing the focus on any specific system view [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        GORE languages can be particularly useful in safety-critical systems where clear and
unambiguous requirements are essential for ensuring the system's reliability and safety [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        Safety standards such as EN50126 (CEN, 2000) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] or EN50128 (CEN, 2001) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] advocate the
need to support design and development activities with semi-formal notations and model-based
development approaches [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Models provide a way of understanding the phenomena, enabling
their representation in a more understandable way through the abstraction of the real world.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. RESafety Approach</title>
      <p>Our approach, named RESafety, enables the early modeling and analysis of safety requirements.
It consists of a set of steps.</p>
      <sec id="sec-3-1">
        <title>STEP 1 – Identify Actors:</title>
        <p>When designing a SCS, it is crucial to identify the relevant stakeholders, which includes people,
or, internal and external systems. Strategic stakeholders will be mapped to actors in iStar4Safety.</p>
      </sec>
      <sec id="sec-3-2">
        <title>STEP 2 – Define iStar4Safety Models:</title>
        <p>Once the actors have been identified, create the dependency model. The following y guidelines
may be useful:
–
–
–
–
–
–</p>
        <p>Guideline 1: Create a standard model without safety elements (non-safety related
part);
Guideline 2: Consider the safety goal of interest;
Guideline: 3 Insert all hazards related to the safety goal of interest;
Guideline 4: Identify all causes for each identified hazard. The causes are the
hazardchild of the hazard;
Guideline 5: Define the mitigation strategy for each leaf hazard – i.e., the safety
resources and safety tasks that should be used to mitigate each leaf hazard;
Guideline 6: Associate the mitigation strategy with an actor which will be responsible
for its achievement through dependency links.</p>
        <p>Guideline 2 through 6 must be repeated in successive iterations until all safety requirements
are appropriately dealt with.</p>
      </sec>
      <sec id="sec-3-3">
        <title>STEP 3 – Consequences of a safety goal not being satisfied:</title>
        <p>
          We are currently considering the use BPMN for the description of the consequences of a safety
goal not being satisfied [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>STEP 4 – Define STPA Analysis:</title>
        <p>
          In order to carry out the STPA safety analysis the following actions must be performed [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]:
– Action 1: Definition of the purpose of the analysis;
– Action 2: Control structure modeling;
– Action 3: Identification of UCAs - Unsafe Control Actions;
– Action 3: Identification of loss scenarios.
        </p>
        <p>Note that iStar4Safety models created in STEP 2 and the BPMN process models of SEP 3 are
input to STEP 4 (STPA analysis).</p>
      </sec>
      <sec id="sec-3-5">
        <title>STEP 5 – Update initial modeling:</title>
        <p>After the STPA analysis (STEP 4) the iStar4Safety and BPMN models.
3.1.</p>
        <p>
          RESafety Illustration
In this section, we provide a short illustration of the use of our approach in the context of an
insulin infusion pump. It was used based on previous iStar4Safety models [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and STPA analysis
[
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-6">
        <title>STEP 1 – Identify System Actors:</title>
        <p>
          The actors related to the Insulin Infusion Pump System initially considered in [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] include
patient, and pump, among others. Given the limited space and the importance of the patient actor,
we will focus on it to illustrate our proposal.
        </p>
      </sec>
      <sec id="sec-3-7">
        <title>STEP 2 – Define iStar4Safety's Models:</title>
        <p>We use iStar4Safety to model the patient actor (see Fig. 1). Consider that this is an initial model
meeting the goals of the early requirements analysis. Therefore, the view in this model is
highlevel one. Setting up the pump to deliver the correct basal infusion is a quite critical safety goal
(see Figure 1).</p>
        <p>After some more careful analysis, we may consider the need to refine the Safety Goal “Set up
basal Infusion” to consider two hazardous situations related to wrong setting of the pump,
which may lead to an overdose or underdose of insulin (see Fig 1).</p>
      </sec>
      <sec id="sec-3-8">
        <title>STEP 3 – Expand safety goals using process modeling:</title>
        <p>It may be worth describing what happens if a safety goal (e.g. “Set up basal infusion”) is not
satisfied. A BPMN diagram with more details of other adverse consequences could be created, but
the scenario treated in this work was reduced due to space limitation.</p>
      </sec>
      <sec id="sec-3-9">
        <title>STEP 4 – Define STPA Analysis:</title>
        <p>
          The initial iStar4Safety model (e.g. Fig 1) and Process model (e.g. Fig 2) can be considered as
input to the STPA analysis, as the one conducted in Martinazzo [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. In his analysis, safety
requirements were specified to deal with the hazards of hyperglycemia, hypoglycemia, glycemic
variations, and dermatological problems.
        </p>
      </sec>
      <sec id="sec-3-10">
        <title>STEP 5 – Update initial modeling:</title>
        <p>Having performed that STPA analysis, it is necessary to update the previous iStar4Safety and
BPMN models. Due to space limitation an excerpt of the revised Patient in iStar4Safety model is
depicted in Fig. 3.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Related Work</title>
      <p>To the best of our knowledge, our approach it the only one relying on goal modeling
(iStar4Safety), BMPN and STPA. Below we discuss some related work.</p>
      <p>
        Sharifi et al. [
        <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
        ] present a proposal to assist in the certification of FinTech that combines
the advantages of the goal orientation of the GRL language with the process modeling of the UCM
language. They start using the onion model for stakeholder identification. As a next step, the GRL
strategic dependency model is made. Here, the authors use various sources of information as
initial artifacts, such as handbooks and interviews with stakeholders. Then, they expand the GRL
model with the Use Case Maps (UCM) model, modeling as UCM the functional goals discovered
in the GRL model, also allowing traceability between the models. The authors propose to carry
out the STPA analysis as a next step. The artifacts created by STPA are used to update the previous
models as well as to create assurance cases. The similarities between our work and [
        <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
        ] are
not mere coincidence. However, there are many differences. We first deal with Safety-Critical
System, creating a process that generalizes the search for safety requirements from the initial
development phase. In addition, we will use the iStar4Safety GORE language[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] which already has
safety constructors as first class citizens. Moreover, they rely on UCM for process modeling while
we are considering the use of BPMN to describe the consequences of a safety goal not being
satisfied.
      </p>
      <p>
        Vilela et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] presents the SARSSi* approach. The solution presented in their work
combined STPA hazard analysis technique with the iStar goal-oriented requirements modeling
technique, generating a preliminary safety analysis. An essential difference is that the former uses
iStar in its standard version to model safety elements, while RESafety relies on iStar4Safety and
the description of unsatisfied safety goals in BPMN.
      </p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions and Future Work</title>
      <p>Our work focuses on developing the RESafety approach, which aligns iStar4Safety and STPA.
iStar4Safety is a goal-oriented modeling language that can be used to model safety requirements
in the early stages of safety analysis, while STPA is an analysis technique based on Systems
Theory. By integrating STPA and iStar4Safety, the RESafety proposal enables a more systematic
and comprehensive approach to model early safety requirements. It enhances the identification
and analysis of safety-related concerns, facilitates communication among stakeholders, and
supports the development of safer and more reliable systems.</p>
      <p>We to have it evaluated by Requirements Engineering and Safety Engineering experts. To
illustrate its potential, we will use RESafety to define safety requirements of at least two types
of Safety-Critical Systems (Medical Domain and Transport Domain),</p>
      <p>In future work, we intend to investigate how other qualities, such as security, reliability, etc.,
can interfere with the System and interact with the safety property. We will explore the need to
model technical, social, and composite safety requirements differently. There is a need to clarify
the navigation strategies between the steps in RESafety.
6. Acknowledgment</p>
      <p>The authors would like to express their gratitude for the financial support provided by
Fundação de Amparo à Ciência e Tecnologia do Estado de Pernambuco (FACEPE), Coordenação
de Aperfeiçoamento de Pessoal de Nível Superior (CAPES), and Conselho Nacional de
Desenvolvimento Científico e Tecnológico (CNPq). Their support has been instrumental in the
successful completion of this research.</p>
    </sec>
    <sec id="sec-6">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>N. G.</given-names>
            <surname>Leveson</surname>
          </string-name>
          ,
          <article-title>Safeware: System Safety and Computers</article-title>
          , ACM, New York, NY, USA,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>N. G.</given-names>
            <surname>Leveson</surname>
          </string-name>
          , Engineering a Safer World: Systems Thinking Applied to Safety, Mit Press, Massachusetts, London, England,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N. G.</given-names>
            <surname>Leveson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P.</given-names>
            <surname>Thomas</surname>
          </string-name>
          , STPA Handbook, first ed.,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Berry</surname>
          </string-name>
          ,
          <article-title>The safety requirements engineering dilemma</article-title>
          ,
          <source>in: Proceedings of the 9th International Workshop on Software Specification and Design</source>
          , IWSSD '98, IEEE Computer Society, Washington, DC, USA,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Chung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>From object-oriented to goal-oriented requirements analysis</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>42</volume>
          ,
          <fpage>31</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Gonçalves</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. A. de Oliveira</surname>
            , I. Monteiro,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Castro</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Araújo</surname>
          </string-name>
          ,
          <article-title>Understanding what is important in iStar extension proposals: the viewpoint of researchers, Requirements Engineering</article-title>
          , Vol
          <volume>24</volume>
          , pp
          <fpage>55</fpage>
          -
          <lpage>84</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ribeiro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Castro</surname>
          </string-name>
          , J. Pimentel,
          <article-title>iStar for safety-critical systems</article-title>
          , in: J.
          <string-name>
            <surname>Pimentel</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          <string-name>
            <surname>Carvallo</surname>
          </string-name>
          , L. López (Eds.),
          <source>Proceedings of the 12th International i* Workshop co-located with 38th International Conference on Conceptual Modeling (ER</source>
          <year>2019</year>
          ), Salvador, Brazil, November 4th,
          <year>2019</year>
          , volume
          <volume>2490</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>BS-EN</surname>
            50126-1-
            <given-names>Railway</given-names>
          </string-name>
          <string-name>
            <surname>Applications</surname>
          </string-name>
          .
          <article-title>The Specification and Demonstration of Reliability, Availability, Maintainability and Safety (RAMS)</article-title>
          .
          <source>Generic RAMS Process</source>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>CLC</given-names>
            , EN-50128
            <surname>- Railway</surname>
          </string-name>
          applications - Communication,
          <source>signalling and processing systems - Software for railway control and protection systems</source>
          .
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Fugivara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Merladet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lahoz</surname>
          </string-name>
          ,
          <article-title>STPA analysis of brazilian sounding rockets launching operations</article-title>
          ,
          <source>Microgravity Sci. Technol</source>
          .
          <volume>33</volume>
          ,
          <year>2021</year>
          . IEEE, pp.
          <fpage>205</fpage>
          -
          <lpage>214</lpage>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>White</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Miers</surname>
          </string-name>
          , BPMN Modeling and
          <article-title>Reference Guide: Understanding and Using BPMN, Business Process Management Process Modeling</article-title>
          , Future Strategies Incorporated,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sharifi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>McLaughlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Amyot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          ,
          <article-title>Goal modeling for fintech certification</article-title>
          , in: R. S. S. Guizzardi, G. Mussbacher (Eds.),
          <source>Proceedings of the Thirteenth International iStar Workshop co-located with 28th IEEE International Requirements Engineering Conference (RE</source>
          <year>2020</year>
          ), volume
          <volume>2641</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>78</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sharifi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Amyot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mylopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>McLaughlin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Feodoroff</surname>
          </string-name>
          ,
          <article-title>Towards improved certification of complex fintech systems - A requirements-based approach</article-title>
          , in
          <source>2022 IEEE 30th International Requirements Engineering Conference Workshops (REW)</source>
          , Melbourne, Australia,
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Martinazzo</surname>
          </string-name>
          , Gerenciamento de risco de uma bomba de infusão de insulina de
          <article-title>baixo custo (in English: Risk management of a low-cost insulin infusion pump</article-title>
          ),
          <source>Master's thesis</source>
          , Universidade Federal de São Paulo,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>J.</given-names>
            <surname>Vilela</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Silva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Castro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. E. G.</given-names>
            <surname>Martins</surname>
          </string-name>
          , T. Gorschek, Sarssi*:
          <article-title>a safety requirements specification method based on stamp/stpa and i* language</article-title>
          ,
          <source>in: Anais do I Brazilian Workshop on Large-scale Critical Systems</source>
          , SBC,
          <string-name>
            <surname>Porto</surname>
            <given-names>Alegre</given-names>
          </string-name>
          ,
          <string-name>
            <surname>RS</surname>
          </string-name>
          , Brasil,
          <year>2019</year>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>24</lpage>
          . URL: https://sol.sbc.org.br/index.php/bware/article/view/7504. doi:
          <volume>10</volume>
          .5753/bware.
          <year>2019</year>
          .
          <volume>7504</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>