{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:47:32Z","timestamp":1725662852279},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540089346"},{"type":"electronic","value":"9783540357315"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1978]]},"DOI":"10.1007\/3-540-08934-9_81","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T16:38:06Z","timestamp":1330187886000},"page":"237-248","source":"Crossref","is-referenced-by-count":1,"title":["Protection in languages for real time programming"],"prefix":"10.1007","author":[{"given":"P.","family":"Ancilotti","sequence":"first","affiliation":[]},{"given":"M.","family":"Boari","sequence":"additional","affiliation":[]},{"given":"N.","family":"Lijtmaer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,25]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Ancilotti,P., Boari,M., Lijtmaer,N. \u2014 Dynamic resource management in a language for real time programming \u2014 AICA 77 Pisa, Italy, October 1977.","DOI":"10.1007\/3-540-08934-9_81"},{"key":"11_CR2","unstructured":"Ancilotti,P., Boari,M., Lijtmaer,N. \u2014 A mechanism for allocating resources and controlling accesses in languages for real time programming \u2014 Internal Report n.B77-23; IEI CNR, Pisa, Italy, December 1977."},{"key":"11_CR3","unstructured":"Brinch Hansen,P. \u2014 Operating System Principles \u2014 Prentice Hall, 1973."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Brinch Hansen,P. \u2014 The programming language Concurrent Pascal \u2014 IEEE Transac. on Software Engineering, Vol.SE-1, n. 2, June 1975.","DOI":"10.1109\/TSE.1975.6312840"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Hoare,C.A.R. \u2014 Monitors: an operating system structuring concept \u2014 Comm. ACM n. 10, October 1974.","DOI":"10.1145\/355620.361161"},{"key":"11_CR6","unstructured":"Jones,A.K. \u2014 Protection in programmed systems \u2014 Dept. of Computer Science, Carnegie-Mellon Univ., Pittsburgh \u2014 June 73."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Jones,A.K., Liskov,B.H. \u2014 A language extension for controlling access to shared data \u2014 IEEE Transactions on Software Engineering, vol. SE-2, December 1976.","DOI":"10.1109\/TSE.1976.233833"},{"key":"11_CR8","unstructured":"Lampson,B.W. \u2014 Protection \u2014 Proc.Fifth Annual Princeton Conf. on Information Sciences and Systems, 1971."},{"key":"11_CR9","unstructured":"Linden,T.A. \u2014 Operating System structures to support security and reliable software \u2014 ACM Computing Surveys, Dec. 76."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Liskov,B., Zilles,S. \u2014 Specifications techniques for data abstractions \u2014 IEEE Trans. on Software Engineering, vol. 1, n. 1, March 1975.","DOI":"10.1109\/TSE.1975.6312816"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Silberschatz,A., Kieburtz,R.B., Bernstein,A. \u2014 Extending Concurrent Pascal to allow dynamic resource management. IEEE Transactions on Software Engineering, Vol. SE-3, n.3, May 1977.","DOI":"10.1109\/TSE.1977.231130"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Wirth,N. \u2014 Modula: a Language for modular multiprogramming \u2014 Software-Practice and Experience, 1, 1977.","DOI":"10.1002\/spe.4380070102"},{"key":"11_CR13","unstructured":"Wulf,W.A. \u2014 Toward a language to support structured programs \u2014 Tech. Report Carnegie-Mellon Univ., Pittsurgh, Pa. April 1974."},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Wulf,W.A., London,R.L., Shaw,M. \u2014 Abstraction and verification in Alphard: introduction to language and methodology \u2014 Techn. Report, Carnegie-Mellon Univ., Pittsburgh 1976.","DOI":"10.21236\/ADA028365"}],"container-title":["Lecture Notes in Computer Science","Information Systems Methodology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-08934-9_81.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:00:34Z","timestamp":1605643234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-08934-9_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1978]]},"ISBN":["9783540089346","9783540357315"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-08934-9_81","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1978]]}}}