{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:19:43Z","timestamp":1725664783083},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540610427"},{"type":"electronic","value":"9783540498742"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-61042-1_44","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T16:11:11Z","timestamp":1330272671000},"page":"167-186","source":"Crossref","is-referenced-by-count":5,"title":["Automatic compositional verification of some Security properties"],"prefix":"10.1007","author":[{"given":"R.","family":"Focardi","sequence":"first","affiliation":[]},{"given":"R.","family":"Gorrieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"D. E. Bell and L. J. La Padula. \u201cSecure Computer Systems: Unified Exposition and Multics Interpretation\u201d. ESD-TR-75-306, MITRE MTR-2997, March 1976.","DOI":"10.21236\/ADA023588"},{"issue":"No.1","key":"11_CR2","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/151646.151648","volume":"15","author":"R. Cleaveland","year":"1993","unstructured":"R. Cleaveland, J. Parrow, and B. Steffen. \u201cThe Concurrency Workbench: a Semantics Based Tool for the Verification of Concurrent Systems\u201d. ACM Transactions on Programming Languages and Systems, Vol. 15 No. 1:36\u201372, January 1993.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"11_CR3","unstructured":"R. Focardi and R. Gorrieri. \u201cThe Compositional Security Checker: A Tool for the Automatic Compositional Verification of Security Properties\u201d. Forthcoming."},{"issue":"1","key":"11_CR4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1994\/1995","unstructured":"R. Focardi and R. Gorrieri. \u201cA Classification of Security Properties for Process Algebras\u201d. Journal of Computer Security, 3(1):5\u201333, 1994\/1995.","journal-title":"Journal of Computer Security"},{"key":"11_CR5","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/CSFW.1995.518553","volume-title":"Proceedings Eight IEEE Computer Security Foundation Workshop, (CSFW'95)","author":"R. Focardi","year":"1995","unstructured":"R. Focardi, R. Gorrieri, and V. Panini. \u201cThe Security Checker: a Semantics-based Tool for the Verification of Security Properties\u201d. In Proceedings Eight IEEE Computer Security Foundation Workshop, (CSFW'95) (Li Gong Ed.), pages 60\u201369, Kenmare (Ireland), June 1995. IEEE Press."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"J. A. Goguen and J. Meseguer. \u201cSecurity Policy and Security Models\u201d. In Proceedings of the 1982 Symposium on Security and Privacy, pages 11\u201320. IEEE Computer Society Press, April 1982.","DOI":"10.1109\/SP.1982.10014"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"C. A. R. Hoare. Communicating Sequential Processes. Prentice-Hall, 1985.","DOI":"10.1007\/978-3-642-82921-5_4"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"P. Kanellakis and S.A. Smolka. \u201cCCS Expression, Finite State Processes, and Three Problems of Equivalence\u201d. Information & Computation 86, pages 43\u201368, May 1990.","DOI":"10.1016\/0890-5401(90)90025-D"},{"key":"11_CR9","unstructured":"R. Milner. Communication and Concurrency. Prentice-Hall, 1989."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"C. R. Tsai, V. D. Gligor, and C. S. Chandersekaran. \u201cOn the Identification of Covert Storage Channels in Secure Systems\u201d. IEEE Transactions on Software Engineering, pages 569\u2013580, June 1990.","DOI":"10.1109\/32.55086"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"J. T. Wittbold and D. M. Johnson. \u201cInformation Flow in Nondeterministic Systems\u201d. In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pages 144\u2013161. IEEE Computer Society Press, 1990.","DOI":"10.1109\/RISP.1990.63846"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-61042-1_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,31]],"date-time":"2021-12-31T05:15:11Z","timestamp":1640927711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-61042-1_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540610427","9783540498742"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-61042-1_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1996]]}}}