{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:27Z","timestamp":1725551187997},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664888"},{"type":"electronic","value":"9783540482499"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48249-0_36","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T17:13:11Z","timestamp":1269882791000},"page":"420-430","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Formal Validation of the GUARDS Inter-consistency Mechanism"],"prefix":"10.1007","author":[{"given":"Cinzia","family":"Bernardeschi","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Fantechi","sequence":"additional","affiliation":[]},{"given":"Stefania","family":"Gnesi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,14]]},"reference":[{"unstructured":"Arlat, J.: Preliminary definition of the GUARDS validation strategy. GUARDS Deliverable D3O1, LAAS-CNRS Report 96378, (1997).","key":"36_CR1"},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1023\/A:1008645826258","volume":"12","author":"C. Bernardeschi","year":"1998","unstructured":"Bernardeschi, C., Fantechi, A., Gnesi, S., Larosa, S., Mongardi, G., Romano, D.: A Formal Verification Environment for Railway Signaling System Design. Formal Methods in System Design 12, (1998) 139\u2013161.","journal-title":"Formal Methods in System Design"},{"key":"36_CR3","volume-title":"Ercim FMICS98","author":"C. Bernardeschi","year":"1998","unstructured":"Bernardeschi, C., Fantechi, A., Gnesi, S., Santone, A.: Automated Verification of fault-tolerant mechanisms. Ercim FMICS98, CWI Press, Amsterdam, (1998)."},{"key":"36_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Proc. EDCC-1, Berlin","author":"C. Bernardeschi","year":"1994","unstructured":"Bernardeschi, C., Fantechi, A., Simoncini, L.: Formal reasoning on fault coverage of fault tolerant techniques: a case study. Proc. EDCC-1, Berlin, Lecture Notes in Computer Science vol. 852, (1994)."},{"key":"36_CR5","first-page":"207","volume":"54","author":"A. Bouali","year":"1994","unstructured":"Bouali, A., Gnesi, S., Larosa, S.: The integration Project for the JACK Environment. Bulletin of the EATCS, 54, (1994) 207\u2013223.","journal-title":"Bulletin of the EATCS"},{"issue":"2","key":"36_CR6","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1145\/5397.5399","volume":"8","author":"E. M. Clarke","year":"1986","unstructured":"Clarke, E. M., Emerson, E. A., Sistla, A. P.: Automatic Verification of Finite-State Concurrent Systems Using Temporal Logic Specification. ACM Transaction on Programming Languages and Systems, 8 (2), (1986) 244\u2013263.","journal-title":"ACM Transaction on Programming Languages and Systems"},{"key":"36_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/3-540-53479-2_17","volume-title":"Proc. Ecole de Printemps on Semantics of Concurrency","author":"R. Nicola De","year":"1990","unstructured":"De Nicola, R., Vaandrager, F. W.: Actions versus State Based Logics for Transition Systems. Proc. Ecole de Printemps on Semantics of Concurrency, Lecture Notes in Computer Science vol. 469, (1990) 407\u2013419."},{"key":"36_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1007\/3-540-60385-9_15","volume-title":"Proc. CHARME\u201995","author":"R. Nicola De","year":"1995","unstructured":"De Nicola, R., Fantechi, A., Gnesi, S., Ristori, G.: Hardware components within JACK. Proc. CHARME\u201995, Lecture Notes in Computer Science vol. 987, (1995) 246\u2013260."},{"unstructured":"Gong, L., Lincoln, P., Rushby J.: Byzantine Agreement with Authentication: Observations and Applications in Tolerating Hybrid and Link Faults. Proc. 5th Conference on Dependable Computing for Critical Applications (DCCA-5), Urbana-Champaign, Il, USA, (1995).","key":"36_CR9"},{"unstructured":"Powell, D., Rab\u00e9jac, C., Schindler, H.: Inter-Channel Consistency Mechanism. GUARDS Esprit project, D1A3\/A0\/2008, (1996).","key":"36_CR10"},{"issue":"N. 3","key":"36_CR11","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, Vol.4, N. 3, (1982) 382\u2013401.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"unstructured":"Wellings, A., Beus-Dukic, L., Burns, A., Powell, D.: Genericity and Upgradability in Ultra-Dependable Real-Time Architectures. Work in Progress Proceedings, Real-Time Systems Symp., Washington D.C., IEEE Computer Society Press, (1996) 15\u201318.","key":"36_CR12"},{"key":"36_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/3-540-60973-3_100","volume-title":"Proc. FME96 Industrial benefit and Advances in Formal methods","author":"R. Pugliese","year":"1996","unstructured":"Pugliese, R., Tronci, E.: Automatic verification of an Hydroelectric Power Plant. Proc. FME96 Industrial benefit and Advances in Formal methods, Lecture Notes in Computer Science vol. 1051, 1996, pp. 425\u2013444."},{"key":"36_CR14","series-title":"Lect Notes Comput Sci","first-page":"65","volume-title":"Proc. Workshop on Computer Aided Verification","author":"V. Roy","year":"1990","unstructured":"Roy, V., De Simone, R.: AUTO and Autograph. Proc. Workshop on Computer Aided Verification, Lecture Notes in Computer Science vol. 531, (1990) 65\u201375."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48249-0_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T10:33:26Z","timestamp":1558262006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48249-0_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664888","9783540482499"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-48249-0_36","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"14 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}