{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:47:48Z","timestamp":1725662868749},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540071686"},{"type":"electronic","value":"9783540375029"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1973]]},"DOI":"10.1007\/3-540-07168-7_80","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T15:51:05Z","timestamp":1330185065000},"page":"319-373","source":"Crossref","is-referenced-by-count":1,"title":["Reliability"],"prefix":"10.1007","author":[{"given":"D.","family":"Tsichritzis","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"unstructured":"NATO Report on SOFTWARE ENGINEERING, Garmish, Oct. 1968. Available through NATO, Dr. H. Arnth-Jensen, Scientific Affairs Division, OTAN\/NATO, 1110 Bruxelles, Belgium.","key":"11_CR1"},{"unstructured":"Ichbiah, J. Compagnie Internationale pour l' Informatique private communications.","key":"11_CR2"},{"doi-asserted-by":"crossref","unstructured":"Elspas, B. et al \"Software Reliability\", IEEE COMPUTER, Vol. 1, No. 1, Jan. 1971.","key":"11_CR3","DOI":"10.1109\/C-M.1971.216741"},{"unstructured":"Henderson, P. and Snowden R. \"An experiment in structured programming\", Technical Report 18, Computer Laboratory, University of Newcastle upon Tyne, 1971.","key":"11_CR4"},{"issue":"4","key":"11_CR5","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/BF01966091","volume":"6","author":"P. Naur","year":"1966","unstructured":"Naur, P. \"Proof of Algorithms by General Snapshots\", BIT, Vol. 6, No. 4, pp. 310\u2013316, 1966.","journal-title":"BIT"},{"key":"11_CR6","series-title":"Mathematical Aspects of Computer Science","first-page":"19","volume-title":"Assigning Meanings to Programs","author":"R.W. Floyd","year":"1967","unstructured":"Floyd, R.W. \"Assigning Meanings to Programs\", Proceedings of a Symposium in Applied Mathematics, Mathematical Aspects of Computer Science, Vol. 19, pp. 19\u201332, J.T. Schwartz (Ed.), American Mathematical Society, Providence, Rhode Island, 1967."},{"unstructured":"London, R.L. \"Computer Programs can be Proved Correct\", Proceedings of the Fourth Systems Symposium \u2014 Formal Systems and Non-Numerical Problem Solving by Computers, held at Case-Western Reserve University, 1968.","key":"11_CR7"},{"issue":"6","key":"11_CR8","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1145\/362384.362507","volume":"13","author":"R.L. London","year":"1970","unstructured":"London, R.L. \"Certification of the Algorithm Treesort\", Communications of the ACM, Vol. 13, No. 6, pp. 371\u2013373, 1970.","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Hoare, C.A.R. \"An Axiomatic Basis for Computer Programming\", Communications of the ACM, Vol. 12, No. 10, 1969.","key":"11_CR9","DOI":"10.1145\/363235.363259"},{"doi-asserted-by":"crossref","unstructured":"Clark, B. and Horning, J. \"The system language for project SUE\", SIGPLAN Symposium for Languages for Systems Implementation, 1971.","key":"11_CR10","DOI":"10.1145\/800234.807062"},{"unstructured":"Snowden, R. \"PEARL: An interactive system for the preparation and validation of structured programs\", Technical Report 28, Computer Laboratory, University of Newcastle upon Tyne, 1971.","key":"11_CR11"},{"doi-asserted-by":"crossref","unstructured":"Manna, Z. and Pnueli, A. \"Formalization of Properties of Recursively Defined Functions\", ACM Symposium of Theory of Computing, pp. 201\u2013210, 1969.","key":"11_CR12","DOI":"10.1145\/800169.805434"},{"key":"11_CR13","volume-title":"Machine Intelligence 1","author":"D. Luckman","year":"1967","unstructured":"Luckman, D. \"The Resolution Principle in Theorem Proving\", Machine Intelligence 1, Collins and Michie (Eds.), American Elsevier, Inc., New York 1967."},{"doi-asserted-by":"crossref","unstructured":"King, J. C. and Floyd, R. W. \"Interpretation Oriented Theorem Prover Over Integers\", Second Annual ACM Symposium on Theory of Computing, pp. 169\u2013179, 1970.","key":"11_CR14","DOI":"10.1145\/800161.805162"},{"doi-asserted-by":"crossref","unstructured":"Dijkstra, E. W. \"The Structure of THE Multiprogramming System. CACM 11, 5, May 1968, 341\u2013346.","key":"11_CR15","DOI":"10.1145\/363095.363143"},{"unstructured":"NATO Report on SOFTWARE ENGINEERING, Rome, Oct. 1969. Available through NATO, Dr. H. Arnth-Jensen, Scientific Affairs Division, OTAN\/NATO, 1110 Bruxelles, Belgium.","key":"11_CR16"},{"doi-asserted-by":"crossref","unstructured":"Habermann, N. \"Synchronization of Communicating Processes\", Third Symposium on Operating Systems Principles, Palo Alto, 1971.","key":"11_CR17","DOI":"10.1145\/800212.806503"},{"doi-asserted-by":"crossref","unstructured":"Coffman, E. et al \"System deadlocks\", ACM Computing Surveys, Vol. 3, No. 2, June 1971.","key":"11_CR18","DOI":"10.1145\/356586.356588"},{"unstructured":"Belday, L. and Lehmann, M. \"Programming System Dynamics\" IBM Report RC 3546, September 1971.","key":"11_CR19"},{"doi-asserted-by":"crossref","unstructured":"Lampson, B. W. \"Dynamic Protection Structures\", Proc. AFIPS Conf. 35, 1969 FJCC.","key":"11_CR20","DOI":"10.1145\/1478559.1478563"},{"unstructured":"Lampson, B. \"Protection\", Proceedings of the Fifth Annual Princeton Conference on Information Sciences and Systems, March 1971, p. 437\u2013443.","key":"11_CR21"},{"unstructured":"Graham, S. and Denning, P. \"Protection: Principles and Practice\", Tech. Report No. 101, Princeton University Electrical Engineering Dept. to appear in SJCC 1972.","key":"11_CR22"},{"doi-asserted-by":"crossref","unstructured":"Dijkstra, E. W. \"Cooperating Sequential Processes\" in Programming Languages (F. Genuys ed.) Academic Press 1968 p. 43\u2013112.","key":"11_CR23","DOI":"10.1007\/978-1-4757-3472-0_2"},{"unstructured":"Conway, R. W. et al \"Security and Privacy in Information Systems \u2014 A Functional Model\" Tech. Report No. 133, Dept. of Operations Research, Cornell University, June 1971, to appear in CACM.","key":"11_CR24"},{"unstructured":"\"COSINE Report on Operating Systems\", available through Commission on Education, National Academy of Engineering, 2101 Constitution Avenue, Washington, D.C. 20418.","key":"11_CR25"},{"doi-asserted-by":"crossref","unstructured":"Schroeder, M. and Saltzer, J. \"A Hardware Architecture for Implementing Protection Rings\", Proceedings of the Third Symposium on Operating Systems Principles, October 18\u201320, p. 42\u201354.","key":"11_CR26","DOI":"10.1145\/800212.806498"},{"doi-asserted-by":"crossref","unstructured":"Graham, R. M. \"Protection in an Informations Processing Utility\", CACM 11, 5, May 1968.","key":"11_CR27","DOI":"10.1145\/363095.363146"},{"unstructured":"Project SUE internal documentation workbook. Computer Systems Research Group, University of Toronto.","key":"11_CR28"},{"doi-asserted-by":"crossref","unstructured":"Brinch, Hansen P. \"The Nucleus of a Multiprogramming System\", CACM 13, April 1970.","key":"11_CR29","DOI":"10.1145\/362258.362278"},{"doi-asserted-by":"crossref","unstructured":"Hoffman, L. \"Computers and Privacy\", ACM Computing Surveys, Vol. 1, No. 2, June 1969.","key":"11_CR30","DOI":"10.1145\/356546.356548"},{"unstructured":"Gotlieb, C. C. and Hume, P. \"Systems Capacity for Data Security\". Draft report for study 6 of Privacy and Computers Task Force.","key":"11_CR31"},{"doi-asserted-by":"crossref","unstructured":"Petersen, H. E. and Turn, R. \"System implications of information privacy\". Proc. AFIPS 1967 Spring Joint Comput. Conf., Vol. 30, Thompson Book Co., Washington, D.C., pp. 291\u2013300.","key":"11_CR32","DOI":"10.1145\/1465482.1465526"},{"issue":"4","key":"11_CR33","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"Shannon, C. E. \"Communication theory of secrecy systems\", Bell Syste. Tech. J. 28, 4, Oct. 1949, 656\u2013715.","journal-title":"Bell Syste. Tech. J."},{"doi-asserted-by":"crossref","unstructured":"Baran, P. On distributed communications: IX. Security, secrecy and tamper-free considerations. Doc. RM-3765-PR Rand Corp., Santa Monica, Calif., August 1964.","key":"11_CR34","DOI":"10.7249\/RM3765"},{"unstructured":"Hsiao, D. K. \"A File System for a Problem Solving Facility\". Ph.D. Diss. in Electrical Engineering, U. of Pennsylvania, Philadelphia, Pa., 1968.","key":"11_CR35"},{"doi-asserted-by":"crossref","unstructured":"Hoffman, L. \"The formulary model for access control and privacy in computer systems\", SLAC Rept. No. 117, Stanford University, May 1970.","key":"11_CR36","DOI":"10.2172\/4148524"},{"doi-asserted-by":"crossref","unstructured":"Beardsley C. \"Is your computer insecure\". IEEE Spectrum, January 1972.","key":"11_CR37","DOI":"10.1109\/MSPEC.1972.5218476"}],"container-title":["Lecture Notes in Computer Science","Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-07168-7_80.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:57:15Z","timestamp":1605643035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-07168-7_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1973]]},"ISBN":["9783540071686","9783540375029"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/3-540-07168-7_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1973]]}}}