{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:49:30Z","timestamp":1760042970684,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319465074"},{"type":"electronic","value":"9783319465081"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46508-1_8","type":"book-chapter","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T21:53:39Z","timestamp":1474494819000},"page":"130-156","source":"Crossref","is-referenced-by-count":13,"title":["Proof Repositories for Compositional Verification of Evolving Software Systems"],"prefix":"10.1007","author":[{"given":"Richard","family":"Bubel","sequence":"first","affiliation":[]},{"given":"Ferruccio","family":"Damiani","sequence":"additional","affiliation":[]},{"given":"Reiner","family":"H\u00e4hnle","sequence":"additional","affiliation":[]},{"given":"Einar Broch","family":"Johnsen","sequence":"additional","affiliation":[]},{"given":"Olaf","family":"Owe","sequence":"additional","affiliation":[]},{"given":"Ina","family":"Schaefer","sequence":"additional","affiliation":[]},{"given":"Ingrid Chieh","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,23]]},"reference":[{"issue":"6","key":"8_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.5381\/jot.2004.3.6.a2","volume":"3","author":"M Barnett","year":"2004","unstructured":"Barnett, M., DeLine, R., F\u00e4hndrich, M., Leino, K.R.M., Schulte, W.: Verification of object-oriented programs with invariants. J. Object Technol. 3(6), 27\u201356 (2004)","journal-title":"J. Object Technol."},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-30569-9_3","volume-title":"Construction and Analysis of Safe, Secure, and Interoperable Smart Devices","author":"M Barnett","year":"2005","unstructured":"Barnett, M., Leino, K.R.M., Schulte, W.: The Spec# programming system: an overview. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, vol. 3362, pp. 49\u201369. Springer, Heidelberg (2005). doi: 10.1007\/978-3-540-30569-9_3"},{"issue":"1","key":"8_CR3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MIS.2014.3","volume":"29","author":"B Beckert","year":"2014","unstructured":"Beckert, B., H\u00e4hnle, R.: Reasoning and verification. IEEE Intell. Syst. 29(1), 20\u201329 (2014)","journal-title":"IEEE Intell. Syst."},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","volume-title":"Verification of Object-Oriented Software. The KeY Approach","year":"2007","unstructured":"Beckert, B., H\u00e4hnle, R., Schmitt, P.H. (eds.): Verification of Object-Oriented Software. The KeY Approach. LNCS (LNAI), vol. 4334. Springer, Heidelberg (2007)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Beckert, B., Klebanov, V.: Proof reuse for deductive program verification. In: Third IEEE International Conference on Software Engineering and Formal Methods, pp. 77\u201386. IEEE Computer Society (2004). http:\/\/doi.ieeecomputersociety.org\/10.1109\/SEFM.2004.10013","DOI":"10.1109\/SEFM.2004.1347505"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Beckert, B., Schmitt, P.H.: Program verification using change information. In: Proceedings, Software Engineering and Formal Methods (SEFM), Brisbane, Australia, pp. 91\u201399. IEEE Press (2003)","DOI":"10.1109\/SEFM.2003.1236211"},{"issue":"2","key":"8_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s00236-012-0173-z","volume":"50","author":"L Bettini","year":"2013","unstructured":"Bettini, L., Damiani, F., Schaefer, I.: Compositional type checking of delta-oriented software product lines. Acta Inform. 50(2), 77\u2013122 (2013). doi: 10.1007\/s00236-012-0173-z","journal-title":"Acta Inform."},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-18070-5_5","volume-title":"Formal Verification of Object-Oriented Software","author":"D Bruns","year":"2011","unstructured":"Bruns, D., Klebanov, V., Schaefer, I.: Verification of software product lines with delta-oriented slicing. In: Beckert, B., March\u00e9, C. (eds.) FoVeOOS 2010. LNCS, vol. 6528, pp. 61\u201375. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-18070-5_5"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-662-45231-8_9","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications","author":"R Bubel","year":"2014","unstructured":"Bubel, R., H\u00e4hnle, R., Pelevina, M.: Fully abstract operation contracts. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014. LNCS, vol. 8803, pp. 120\u2013134. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45231-8_9"},{"issue":"4","key":"8_CR10","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1007\/s00165-013-0278-3","volume":"26","author":"F Damiani","year":"2014","unstructured":"Damiani, F., Dovland, J., Johnsen, E.B., Schaefer, I.: Verifying traits: an incremental proof system for fine-grained reuse. Formal Aspects Comput. 26(4), 761\u2013793 (2014)","journal-title":"Formal Aspects Comput."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Damiani, F., Owe, O., Dovland, J., Schaefer, I., Johnsen, E.B., Yu, I.C.: A transformational proof system for delta-oriented programming. In: Proceedings of the 16th International Software Product Line Conference (SPLC), vol. 2, pp. 53\u201360. ACM (2012)","DOI":"10.1145\/2364412.2364422"},{"issue":"7","key":"8_CR12","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.jlap.2010.07.008","volume":"79","author":"J Dovland","year":"2010","unstructured":"Dovland, J., Johnsen, E.B., Owe, O., Steffen, M.: Lazy behavioral subtyping. J. Logic Algebraic Program. 79(7), 578\u2013607 (2010)","journal-title":"J. Logic Algebraic Program."},{"issue":"10","key":"8_CR13","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1016\/j.scico.2010.09.006","volume":"76","author":"J Dovland","year":"2011","unstructured":"Dovland, J., Johnsen, E.B., Owe, O., Steffen, M.: Incremental reasoning with lazy behavioral subtyping for multiple inheritance. Sci. Comput. Program. 76(10), 915\u2013941 (2011)","journal-title":"Sci. Comput. Program."},{"issue":"1","key":"8_CR14","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.jlamp.2014.09.001","volume":"84","author":"J Dovland","year":"2015","unstructured":"Dovland, J., Johnsen, E.B., Owe, O., Yu, I.C.: A proof system for adaptable class hierarchies. J. Log. Algebraic Methods Program. 84(1), 37\u201353 (2015)","journal-title":"J. Log. Algebraic Methods Program."},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-34026-0_19","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change","author":"J Dovland","year":"2012","unstructured":"Dovland, J., Johnsen, E.B., Yu, I.C.: Tracking behavioral constraints during object-oriented software evolution. In: Margaria, T., Steffen, B. (eds.) ISoLA 2012. LNCS, vol. 7609, pp. 253\u2013268. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34026-0_19"},{"key":"8_CR16","unstructured":"Engel, C., Roth, A., Schmitt, P.H., Wei\u00df, B.: Verification of modifies clauses in dynamic logic with non-rigid functions. Technical report 2009\u20139, Department of Computer Science, University of Karlsruhe (2009)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-642-18070-5_2","volume-title":"Formal Verification of Object-Oriented Software","author":"M F\u00e4hndrich","year":"2011","unstructured":"F\u00e4hndrich, M., Logozzo, F.: Static contract checking with abstract interpretation. In: Beckert, B., March\u00e9, C. (eds.) FoVeOOS 2010. LNCS, vol. 6528, pp. 10\u201330. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-18070-5_2"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-73368-3_21","volume-title":"Computer Aided Verification","author":"J-C Filli\u00e2tre","year":"2007","unstructured":"Filli\u00e2tre, J.-C., March\u00e9, C.: The Why\/Krakatoa\/Caduceus platform for deductive program verification. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol. 4590, pp. 173\u2013177. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-73368-3_21"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science (LNCS)","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-642-38574-2_21","volume-title":"Automated Deduction \u2013 CADE-24","author":"R H\u00e4hnle","year":"2013","unstructured":"H\u00e4hnle, R., Schaefer, I., Bubel, R.: Reuse in software verification by abstract method calls. In: Bonacina, M.P. (ed.) CADE 2013. LNCS (LNAI), vol. 7898, pp. 300\u2013314. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38574-2_21"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-540-32254-2_24","volume-title":"Mechanizing Mathematical Reasoning","author":"D Hutter","year":"2005","unstructured":"Hutter, D., Autexier, S.: Formal software development in MAYA. In: Hutter, D., Stephan, W. (eds.) Mechanizing Mathematical Reasoning. LNCS (LNAI), vol. 2605, pp. 407\u2013432. Springer, Heidelberg (2005). doi: 10.1007\/978-3-540-32254-2_24"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-20398-5_4","volume-title":"NASA Formal Methods","author":"B Jacobs","year":"2011","unstructured":"Jacobs, B., Smans, J., Philippaerts, P., Vogels, F., Penninckx, W., Piessens, F.: VeriFast: a powerful, sound, predictable, fast verifier for C and Java. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 41\u201355. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-20398-5_4"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/11813040_19","volume-title":"FM 2006: Formal Methods","author":"IT Kassios","year":"2006","unstructured":"Kassios, I.T.: Dynamic frames: support for framing, dependencies and sharing without restrictions. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol. 4085, pp. 268\u2013283. Springer, Heidelberg (2006). doi: 10.1007\/11813040_19"},{"key":"8_CR23","unstructured":"Leavens, G.T., Poll, E., Clifton, C., Cheon, Y., Ruby, C., Cok, D., M\u00fcller, P., Kiniry, J., Chalin, P., Zimmerman, D.M.: JML reference manual (2009). ftp:\/\/ftp.cs.iastate.edu\/pub\/leavens\/JML\/jmlrefman.pdf. Draft revision 1.235"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science(Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-642-17511-4_20","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"KRM Leino","year":"2010","unstructured":"Leino, K.R.M.: Dafny: an automatic program verifier for functional correctness. In: Clarke, E.M., Voronkov, A. (eds.) LPAR 2010. LNCS(LNAI), vol. 6355, pp. 348\u2013370. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-17511-4_20"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/978-3-319-21690-4_22","volume-title":"Computer Aided Verification","author":"KRM Leino","year":"2015","unstructured":"Leino, K.R.M., W\u00fcstholz, V.: Fine-grained caching of verification results. In: Kroening, D., P\u0103s\u0103reanu, C.S. (eds.) CAV 2015. LNCS, vol. 9206, pp. 380\u2013397. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-21690-4_22"},{"issue":"6","key":"8_CR26","doi-asserted-by":"crossref","first-page":"1811","DOI":"10.1145\/197320.197383","volume":"16","author":"B Liskov","year":"1994","unstructured":"Liskov, B., Wing, J.M.: A behavioral notion of subtyping. ACM Trans. Program. Lang. Syst. 16(6), 1811\u20131841 (1994)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"10","key":"8_CR27","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B Meyer","year":"1992","unstructured":"Meyer, B.: Applying \u201cdesign by contract\u201d. IEEE Comput. 25(10), 40\u201351 (1992)","journal-title":"IEEE Comput."},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","first-page":"154","volume-title":"FM 2011: Formal Methods","author":"P M\u00fcller","year":"2011","unstructured":"M\u00fcller, P., et al.: The 1st verified software competition: experience report. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol. 6664, pp. 154\u2013168. Springer, Heidelberg (2011)"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/3-540-57529-4_61","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"W Reif","year":"1993","unstructured":"Reif, W., Stenzel, K.: Reuse of proofs in software verification. In: Shyamasundar, R.K. (ed.) FSTTCS 1993. LNCS, vol. 761, pp. 284\u2013293. Springer, Heidelberg (1993). doi: 10.1007\/3-540-57529-4_61"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Reynolds, J.C.: Separation logic: A logic for shared mutable data structures. In: 17th IEEE Symposium on Logic in Computer Science (LICS 2002), pp. 55\u201374. IEEE Computer Society (2002)","DOI":"10.1109\/LICS.2002.1029817"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-15579-6_6","volume-title":"Software Product Lines: Going Beyond","author":"I Schaefer","year":"2010","unstructured":"Schaefer, I., Bettini, L., Bono, V., Damiani, F., Tanzarella, N.: Delta-oriented programming of software product lines. In: Bosch, J., Lee, J. (eds.) SPLC 2010. LNCS, vol. 6287, pp. 77\u201391. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15579-6_6"},{"issue":"5","key":"8_CR32","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/s10009-012-0253-y","volume":"14","author":"I Schaefer","year":"2012","unstructured":"Schaefer, I., Rabiser, R., Clarke, D., Bettini, L., Benavides, D., Botterweck, G., Pathak, A., Trujillo, S., Villela, K.: Software diversity: state of the art and perspectives. Int. J. Softw. Tools Technol. Transf. 14(5), 477\u2013495 (2012). doi: 10.1007\/s10009-012-0253-y","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"8_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/3-540-45719-4_30","volume-title":"Algebraic Methodology and Software Technology","author":"A Schairer","year":"2002","unstructured":"Schairer, A., Hutter, D.: Proof transformations for evolutionary formal software development. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002. LNCS, vol. 2422, pp. 441\u2013456. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45719-4_30"},{"key":"8_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-18070-5_10","volume-title":"Formal Verification of Object-Oriented Software","author":"PH Schmitt","year":"2011","unstructured":"Schmitt, P.H., Ulbrich, M., Wei\u00df, B.: Dynamic frames in java dynamic logic. In: Beckert, B., March\u00e9, C. (eds.) FoVeOOS 2010. LNCS, vol. 6528, pp. 138\u2013152. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-18070-5_10"}],"container-title":["Lecture Notes in Computer Science","Transactions on Foundations for Mastering Change I"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46508-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:24:31Z","timestamp":1498332271000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46508-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319465074","9783319465081"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46508-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}