SEARCH Articles Figures Tables VIII 1.3.1-1 Safety Integrity of Hardware Architectural Constraints [Publishers Imprint]