{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T04:17:42Z","timestamp":1748405862031,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319192819"},{"type":"electronic","value":"9783319192826"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19282-6_13","type":"book-chapter","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T11:05:56Z","timestamp":1430305556000},"page":"197-212","source":"Crossref","is-referenced-by-count":2,"title":["Klaim-DB: A Modeling Language for Distributed Database Applications"],"prefix":"10.1007","author":[{"given":"Xi","family":"Wu","sequence":"first","affiliation":[]},{"given":"Ximeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Alberto Lluch","family":"Lafuente","sequence":"additional","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"13_CR1","first-page":"619","volume":"13","author":"J.-R. Abrial","year":"2007","unstructured":"Abrial, J.-R.: Formal methods: Theory becoming practice. J. UCS\u00a013(5), 619\u2013628 (2007)","journal-title":"J. UCS"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"De Nicola, R., Ferrari, G.L., Pugliese, R.: KLAIM: A kernel language for agents interaction and mobility. IEEE Trans. Software Eng. (1998)","DOI":"10.1109\/32.685256"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Encyclopedia of Cryptography and Security, 2nd edn., pp. 338\u2013340 (2011)","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall (1985)","DOI":"10.1007\/978-3-642-82921-5_4"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Kuhn, E., Ludwig, T.: Vip-mdbs: A logic multidatabase system. In: Proceedings of the First International Symposium on Databases in Parallel and Distributed Systems, DPDS 1988, pp. 190\u2013201. IEEE Computer Society Press (1988)","DOI":"10.1109\/DPDS.1988.675015"},{"issue":"3","key":"13_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/BF01974950","volume":"5","author":"E. K\u00fchn","year":"1995","unstructured":"K\u00fchn, E., Elmagarmid, A.K., Leu, Y., Boudriga, N.: A parallel logic language for transaction specification in multidatabase systems. Journal of Systems Integration\u00a05(3), 219\u2013252 (1995)","journal-title":"Journal of Systems Integration"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Louren\u00e7o, L., Caires, L.: Information flow analysis for valued-indexed data security compartments. In: Trustworthy Global Computing - 8th International Symposium, TGC 2013, pp. 180\u2013198 (2013)","DOI":"10.1007\/978-3-319-05119-2_11"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Plotkin, G.D.: A structural approach to operational semantics. J. Log. Algebr. Program.\u00a060-61:17\u2013139 (2004)","DOI":"10.1016\/j.jlap.2004.05.001"},{"key":"13_CR9","unstructured":"Thirukonda, M.M., Menezes, R.: On the use of linda as a framework for distributed database systems (2002)"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-540-75227-1_13","volume-title":"Formal Aspects in Security and Trust","author":"T.K. Tolstrup","year":"2007","unstructured":"Tolstrup, T.K., Nielson, F., Hansen, R.R.: Locality-based security policies. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol.\u00a04691, pp. 185\u2013201. Springer, Heidelberg (2007)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.S.: Formal methods: Practice and experience. ACM Comput. Surv.\u00a041(4) (2009)","DOI":"10.1145\/1592434.1592436"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Zloof, M.M.: Query by example. In: Proceedings of the National Computer Conference and Exposition, AFIPS 1975, pp. 431\u2013438. ACM, New York (1975)","DOI":"10.1145\/1499949.1500034"}],"container-title":["Lecture Notes in Computer Science","Coordination Models and Languages"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19282-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T17:25:32Z","timestamp":1748366732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19282-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319192819","9783319192826"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19282-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}