{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:04:50Z","timestamp":1725573890977},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540204619"},{"type":"electronic","value":"9783540398936"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39893-6_35","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T10:35:57Z","timestamp":1294396557000},"page":"620-640","source":"Crossref","is-referenced-by-count":2,"title":["A Mathematical Framework for Safecharts"],"prefix":"10.1007","author":[{"given":"Hamdan","family":"Dammag","sequence":"first","affiliation":[]},{"given":"Nimal","family":"Nissanke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Barka, E., Sandhu, R.: Framework for Role-Based Delegation Models. In: Proceedings of the 16th IEEE Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 2000, pp. 168\u2013175 (2000)","DOI":"10.1109\/ACSAC.2000.898870"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Dammag, H., Nissanke, N.: Safecharts for specifying and designing safety critical systems. In: Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, Lausanne, Switzerland, pp. 78\u201387 (1999)","DOI":"10.1109\/RELDIS.1999.805085"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Dammag, H., Nissanke, N.: A Mathematical Definition for Safecharts. Technical Report, South Bank University, SBU-CISM-03-02 (March 2003)","DOI":"10.1007\/978-3-540-39893-6_35"},{"key":"35_CR4","unstructured":"Day, N.: A Model Checker for Statecharts (Linking CASE tools with formal Methods). Technical Report 93-35, University of British Columbia, Vancouver, Canada (1993)"},{"key":"35_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/3-540-60406-5_19","volume-title":"Software Engineering - ESEC \u201995","author":"M. Glinz","year":"1995","unstructured":"Glinz, M.: An Integrated Formal Model of Scenarios Based on Statecharts. In: Botella, P., Sch\u00e4fer, W. (eds.) ESEC 1995. LNCS, vol.\u00a0989, pp. 254\u2013271. Springer, Heidelberg (1995)"},{"issue":"3","key":"35_CR6","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","volume":"8","author":"D. Harel","year":"1987","unstructured":"Harel, D.: Statecharts: A Visual Formalism For Complex Systems. Science of Computer Programming\u00a08(3), 231\u2013274 (1987)","journal-title":"Science of Computer Programming"},{"issue":"4","key":"35_CR7","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/235321.235322","volume":"5","author":"D. Harel","year":"1996","unstructured":"Harel, D., Naamad, A.: The STATEMATE Semantics of Statecharts. ACM Transactions on Software Engineering and Methodology\u00a05(4), 293\u2013333 (1996)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"4","key":"35_CR8","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/0020-0190(91)90190-S","volume":"37","author":"C. Huizing","year":"1991","unstructured":"Huizing, C., de Roever, W.: Introduction to Design Choices in the Semantics of Statecharts. Information Processing Letters\u00a037(4), 205\u2013213 (1991)","journal-title":"Information Processing Letters"},{"key":"35_CR9","unstructured":"Hong, H.S., Kim, J.H., Cha, S.D., Kwon, Y.R.: Static Semantics and Priority Schemes for Statecharts. In: Proceedings of the 19th International Computer Software and Applications Conference COMPSAC 1995, Texas, USA, pp. 114\u2013120 (1995)"},{"issue":"1","key":"35_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504077.504078","volume":"3","author":"G. L\u00fcttgen","year":"2002","unstructured":"L\u00fcttgen, G., Mendler, M.: The Intuitionism Behind Statecharts Steps. ACM Transactions on Computational Logic\u00a03(1), 1\u201341 (2002)","journal-title":"ACM Transactions on Computational Logic"},{"issue":"1","key":"35_CR11","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/S0304-3975(01)00381-4","volume":"290","author":"A. Maggiolo-Scheltini","year":"2003","unstructured":"Maggiolo-Scheltini, A., Peron, A., Tini, S.: A Comparison of Statecharts Step Semantics. Theoretical Computer Science Journal\u00a0290(1), 465\u2013498 (2003)","journal-title":"Theoretical Computer Science Journal"},{"issue":"9","key":"35_CR12","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/S0925-7535(01)00089-3","volume":"40","author":"N. Nissanke","year":"2002","unstructured":"Nissanke, N., Dammag, H.: Design for safety in Safecharts with risk ordering of states. Safety Science\u00a040(9), 753\u2013763 (2002)","journal-title":"Safety Science"},{"key":"35_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/3-540-54415-1_49","volume-title":"Theoretical Aspects of Computer Software","author":"A. Pnueli","year":"1991","unstructured":"Pnueli, A., Shalev, A.: What is in a Step: On the Semantics of Statecharts. In: Ito, T., Meyer, A.R. (eds.) TACS 1991. LNCS, vol.\u00a0526, pp. 244\u2013265. Springer, Heidelberg (1991)"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards A Uinfied Standard. In: Proceedings of 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, July 2000, pp. 47\u201364 (2000)","DOI":"10.1145\/344287.344301"},{"key":"35_CR15","series-title":"LNCS","first-page":"128","volume-title":"A Comparison of Statecharts variants","author":"M. Beek Von der","year":"1996","unstructured":"Von der Beek, M.: A Comparison of Statecharts variants. LNCS, vol.\u00a0863, pp. 128\u2013148. Springer, Berlin (1996)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39893-6_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T13:43:23Z","timestamp":1559915003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39893-6_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540204619","9783540398936"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39893-6_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}