{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T01:37:12Z","timestamp":1750469832445,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540212997"},{"type":"electronic","value":"9783540247302"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24730-2_21","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:00:15Z","timestamp":1280761215000},"page":"251-265","source":"Crossref","is-referenced-by-count":14,"title":["The Succinct Solver Suite"],"prefix":"10.1007","author":[{"given":"Flemming","family":"Nielson","sequence":"first","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hongyan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Mikael","family":"Buchholtz","sequence":"additional","affiliation":[]},{"given":"Ren\u00e9 Rydhof","family":"Hansen","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Pilegaard","sequence":"additional","affiliation":[]},{"given":"Helmut","family":"Seidl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Personal communication with Luis Fernando P. de Castro from the XSB team, http:\/\/sourceforge.net\/mailarchive\/message.php?msg_id=4349555"},{"issue":"1","key":"21_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols \u2013 The Spi calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"21_CR3","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/B978-0-934613-40-8.50006-3","volume-title":"Foundations of Deductive Databases and Logic Programming","author":"K. Apt","year":"1988","unstructured":"Apt, K., Blair, H., Walker, A.: A theory of declarative programming. In: Foundations of Deductive Databases and Logic Programming, pp. 89\u2013148. Morgan Kaufmann, San Francisco (1988)"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/CSFW.2003.1212709","volume-title":"Proceedings of the 16th Computer Security Foundations Workshop (CSFW 2003)","author":"C. Bodei","year":"2003","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Automatic validation of protocol narration. In: Proceedings of the 16th Computer Security Foundations Workshop (CSFW 2003), pp. 126\u2013140. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"21_CR5","unstructured":"Buchholtz, M., Nielson, F., Riis Nielson, H.: Experiments with Succinct Solvers. Technical Report IMM-TR-2002-4, Informatics and Mathematical Modelling, Technical University of Denmark (2002)"},{"issue":"1","key":"21_CR6","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0304-3975(99)00231-5","volume":"240","author":"L. Cardelli","year":"2000","unstructured":"Cardelli, L., Gordon, A.D.: Mobile Ambients. Theoretical Computer Science\u00a0240(1), 177\u2013213 (2000)","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(80)90032-X","volume":"21","author":"A. Chandra","year":"1980","unstructured":"Chandra, A., Harel, D.: Computable queries for relational data bases. Journal of Computer and System Sciences\u00a021(2), 156\u2013178 (1980)","journal-title":"Journal of Computer and System Sciences"},{"key":"21_CR8","first-page":"238","volume-title":"POPL 1997","author":"P. Cousot","year":"1997","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: POPL 1997, pp. 238\u2013252. ACM Press, New York (1997)"},{"key":"21_CR9","unstructured":"Rydhof Hansen, R.: A prototype tool for JavaCard firewall analysis. In: Nordic Workshop on Secure IT-Systems, NordSec 2002, Karlstad, Sweden, Proceedings published as Karlstad University Studies 2002:31 (November 2002)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Kolaitis, P.G.: Implicit definability on finite structures and unambiguous computations (preliminary report). In: 5th Annual IEEE Symposium on Logic in Computer Science (LICS), pp. 168\u2013180 (1990)","DOI":"10.1109\/LICS.1990.113743"},{"key":"21_CR11","unstructured":"Marlet, R.: DeMoney: Java Card implementation. SECSAFE-TL-008, Trusted Logic (November 2002)"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-48294-6_21","volume-title":"Static Analysis","author":"D. McAllester","year":"1999","unstructured":"McAllester, D.: On the complexity analysis of static analyses. In: Cortesi, A., Fil\u00e9, G. (eds.) SAS 1999. LNCS, vol.\u00a01694, pp. 312\u2013329. Springer, Heidelberg (1999)"},{"key":"21_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F. Nielson","year":"1999","unstructured":"Nielson, F., Riis Nielson, H., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/3-540-45927-8_18","volume-title":"Programming Languages and Systems","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Riis Nielson, H., Seidl, H.: Automatic Complexity Analysis. In: Le M\u00e9tayer, D. (ed.) ESOP 2002. LNCS, vol.\u00a02305, pp. 243\u2013261. Springer, Heidelberg (2002)"},{"key":"21_CR15","unstructured":"Nielson, F., Riis Nielson, H., Sun, H.: Observation predicates in Flow Logic. Secsafe-imm-010, Informatics and Mathematical Modelling, Technical University of Denmark (September 2003)"},{"key":"21_CR16","first-page":"335","volume":"9","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Seidl, H., Riis Nielson, H.: A Succinct Solver for ALFP. Nordic Journal of Computing\u00a09, 335\u2013372 (2002)","journal-title":"Nordic Journal of Computing"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-36377-7_11","volume-title":"The Essence of Computation","author":"H. Riis Nielson","year":"2002","unstructured":"Riis Nielson, H., Nielson, F.: Flow Logic: a multi-paradigmatic approach to static analysis. In: Mogensen, T.\u00c6., Schmidt, D.A., Sudborough, I.H. (eds.) The Essence of Computation. LNCS, vol.\u00a02566, pp. 223\u2013244. Springer, Heidelberg (2002)"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-24631-2_6","volume-title":"Foundations of Security Analysis and Design II","author":"H. Riis Nielson","year":"2004","unstructured":"Riis Nielson, H., Nielson, F., Buchholtz, M.: Security for mobility. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2001. LNCS, vol.\u00a02946, pp. 207\u2013265. Springer, Heidelberg (2004)"},{"key":"21_CR19","unstructured":"Pilegaard, H.: A feasibility study - the Succinct Solver v.2.0, XSB Prolog v.2.6, and flow-logic based program analysis for Carmel. SECSAFE-IMM-008, Informatics and Mathematical Modelling, Technical University of Denmark (October 2003)"},{"issue":"2","key":"21_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF01228880","volume":"3","author":"R. Ramakrishnan","year":"1994","unstructured":"Ramakrishnan, R., Srivastava, D., Sudarshan, S., Seshadri, P.: The CORAL Deductive System. VLDB Journal\u00a03(2), 161\u2013210 (1994)","journal-title":"VLDB Journal"},{"key":"21_CR21","unstructured":"Sagonas, K., Swift, T., Warren, D.S., Freire, J., Rao, P., Cui, B., Johnson, E.: The XSB System (2003), Web page: http:\/\/xsb.sourceforge.net\/"},{"key":"21_CR22","unstructured":"Siveroni, I.: SecSafe (2003), Web page: http:\/\/www.doc.ic.ac.uk\/~siveroni\/secsafe\/"},{"key":"21_CR23","unstructured":"Sun, H., Riis Nielson, H., Nielson, F.: Extended features in the Succinct Solver (V2.0). SECSAFE-IMM-009, Informatics and Mathematical Modelling, Technical University of Denmark (October 2003)"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24730-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T17:59:43Z","timestamp":1740333583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24730-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540212997","9783540247302"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24730-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}