{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:55:17Z","timestamp":1747810517899},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664628"},{"type":"electronic","value":"9783540482574"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48257-1_15","type":"book-chapter","created":{"date-parts":[[2007,7,20]],"date-time":"2007-07-20T16:25:09Z","timestamp":1184948709000},"page":"243-250","source":"Crossref","is-referenced-by-count":2,"title":["Critical Systems Validation and Verification with CSP and FDR"],"prefix":"10.1007","author":[{"given":"Michael","family":"Goldsmith","sequence":"first","affiliation":[]},{"given":"Irfan","family":"Zakiuddin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"N.A. Brock and D.M. Jackson. Formal Verification of a Fault Tolerant Computer. In Proceedings of 1992 Digital Avionics Systems Conference. IEEE, 1992.","DOI":"10.1109\/DASC.1992.282170"},{"key":"15_CR2","unstructured":"http:\/\/wwH.mcs.le.ac.uk\/~gloHe\/security\/casper\/index.html . World Wide Web page."},{"key":"15_CR3","unstructured":"Sadie Creese. An inductive technique for modelling arbitrarily configured networks. MSc thesis, Oxford University Computing Laboratory, 1997."},{"key":"15_CR4","unstructured":"Michael Goldsmith and Bill Roscoe. The perfect\u2019 spy\u2019 for model-checking cryptoprotocols. In Proceedings of DIMACS Workshop on Design and Formal Verification of Cryptographic Protocols, Rutgers, 1997."},{"key":"15_CR5","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1985","unstructured":"C.A.R. Hoare. Communicating Sequential Processes. Prentice-Hall International, Englewood Cliffs, New Jersey, 1985."},{"key":"15_CR6","unstructured":"Ranko S. Lazi\u0107. A Semantic Study of Data-independence with Applications to Mechanical Verification of Concurrent Systems. Technical report, Merton College, May 1997. A Dissertation Submitted for (and Winning!) the Oxford University Senior Mathematical Prize."},{"key":"15_CR7","unstructured":"http:\/\/www.comlab.ox.ac.uk\/oucl\/groups\/security . World-Wide Web page."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"J.N. Reed, D.M. Jackson, B. Deianov, and G.M. Reed. Automated formal analysis of networks: FDR models of arbitrary topologies amd flow-control mechanisms. In European Joint Workshop on Theory and Practice in Software; Fundamental Approaches to Software Engineering (ETAPS-FASE\u201998), Lisbon, March 1998.","DOI":"10.1007\/BFb0053594"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"A.W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR. In Symposium on Foundations of Secure Systems. IEEE, 1995.","DOI":"10.1109\/CSFW.1995.518556"},{"key":"15_CR10","unstructured":"A.W. Roscoe. The Theory and Practice of Concurrency. Prentice Hall, 1998. ISBN 0-13-6774409-5, pp. xv+565."},{"key":"15_CR11","series-title":"Lect Notes Comput Sci","first-page":"33","volume-title":"1994 European Symposium on Research in Computer Security","author":"A.W. Roscoe","year":"1994","unstructured":"A.W. Roscoe, J.C.P. Woodcock, and L. Wulf. Non-interference through determinism. In 1994 European Symposium on Research in Computer Security, number 875 in LNCS, pages 33\u201353. Springer, 1994."},{"key":"15_CR12","unstructured":"Andrew Simpson. Safety through Security. DPhil, Oxford University Computing Laboratory, Trinity 1996."}],"container-title":["Lecture Notes in Computer Science","Applied Formal Methods \u2014 FM-Trends 98"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48257-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T07:08:09Z","timestamp":1556694489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48257-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664628","9783540482574"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-48257-1_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}