{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T15:42:15Z","timestamp":1698248535204},"reference-count":3,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":4534,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1994,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The C programming language provides no bounds\u2010checking for arrays. As a result, string operations provided in the standard C library are potentially unsafe. A solution, in the form of a safe string library, is presented. The design goals are safety, inter\u2010operability with existing safe and unsafe routines, debugging help and ease of use.<\/jats:p>","DOI":"10.1002\/spe.4380240604","type":"journal-article","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T07:06:56Z","timestamp":1163833616000},"page":"565-578","source":"Crossref","is-referenced-by-count":7,"title":["Design of a safe string library for C"],"prefix":"10.1002","volume":"24","author":[{"given":"Ajith K.","family":"Narayanan","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_2_1_2_2","volume-title":"The C Programming Language","author":"Kernighan Brian W.","year":"1988"},{"key":"e_1_2_1_3_2","volume-title":"Programming Language C","author":"American National Standard for Information Systems","year":"1990"},{"key":"e_1_2_1_4_2","volume-title":"The Standard C Library","author":"Plauger P. J.","year":"1992"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380240604","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380240604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T06:19:05Z","timestamp":1698128345000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380240604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,6]]},"references-count":3,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1994,6]]}},"alternative-id":["10.1002\/spe.4380240604"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380240604","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1994,6]]}}}