{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:43:18Z","timestamp":1725514998137},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540698234"},{"type":"electronic","value":"9783540698241"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69824-1_4","type":"book-chapter","created":{"date-parts":[[2008,7,11]],"date-time":"2008-07-11T07:29:24Z","timestamp":1215761364000},"page":"41-59","source":"Crossref","is-referenced-by-count":5,"title":["Controlling Accessibility in Agile Projects with the Access Modifier Modifier"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Bouillon","sequence":"first","affiliation":[]},{"given":"Eric","family":"Gro\u00dfkinsky","sequence":"additional","affiliation":[]},{"given":"Friedrich","family":"Steimann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"4_CR1","doi-asserted-by":"crossref","first-page":"95","DOI":"10.5381\/jot.2002.1.5.a1","volume":"1","author":"G. Ardourel","year":"2002","unstructured":"Ardourel, G., Huchard, M.: Access graphs: Another view on static access control for a better understanding and use. Journal of Object Technology\u00a01(5), 95\u2013116 (2002)","journal-title":"Journal of Object Technology"},{"key":"4_CR2","unstructured":"Create Privately Publish Later, http:\/\/c2.com\/ppr\/wiki\/JavaIdioms\/CreatePrivatelyPublishLater.html"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Devanbu, P.T., Balzer, B., Batory, D.S., Kiczales, G., Launchbury, J., Parnas, D.L., Tarr, P.L.: Modularity in the new millenium: A panel summary. In: ICSE, pp. 723\u2013724 (2003)","DOI":"10.1109\/ICSE.2003.1201261"},{"key":"4_CR4","unstructured":"Eclipse Naming Conventions, http:\/\/wiki.eclipse.org\/Naming_Conventions#Internal_Implementation_Packages"},{"key":"4_CR5","unstructured":"M Fowler Refactoring: Improving the Design of Existing Code. Addison-Wesley (1999)"},{"issue":"2","key":"4_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/52.991326","volume":"19","author":"M. Fowler","year":"2002","unstructured":"Fowler, M.: Public versus published interfaces. IEEE Software\u00a019(2), 18\u201319 (2002)","journal-title":"IEEE Software"},{"key":"4_CR7","unstructured":"Gamma, E., Helm, R., Johnson, R.: J Vlissides Design Patterns \u2013 Elements of Reusable Software. Addison-Wesley (1995)"},{"key":"4_CR8","unstructured":"Package Naming Conventions Used in the Apache Harmony Class Library, http:\/\/harmony.apache.org\/subcomponents\/classlibrary\/pkgnaming.html"},{"key":"4_CR9","unstructured":"Gosling, J., Joy, B., Steele, G., Bracha, G.: The Java Language Specification, http:\/\/java.sun.com\/docs\/books\/jls\/"},{"key":"4_CR10","unstructured":"Gro\u00dfkinsky, E.: Access Modifier Modifier: Ein Werkzeug zur Einstellung der Sichtbarkeit in Java-Programmen (Master-Arbeit, Lehrgebiet Programmiersysteme, Fernuniversit\u00e4t in Hagen (2007)"},{"key":"4_CR11","unstructured":"Kegel, H.: Constraint-basierte Typinferenz f\u00fcr Java 5 (Diplomarbeit, Fakult\u00e4t f\u00fcr Mathematik und Informatik, Fernuniversit\u00e4t in Hagen 2007)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Kegel, H., Steimann, F.: Systematically refactoring inheritance to delegation in Java. In: ICSE (2008)","DOI":"10.1145\/1368088.1368147"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Kiczales, G., Mezini, M.: Aspect-oriented programming and modular reasoning. In: ICSE, pp. 49\u201358 (2005)","DOI":"10.1145\/1062455.1062482"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Koved, L., Pistoia, M., Kershenbaum, A.: Access rights analysis for Java. In: OOPSLA, pp. 359\u2013372 (2002)","DOI":"10.1145\/582419.582452"},{"key":"4_CR15","unstructured":"Leeman, G., Kershenbaum, A., Koved, L., Reimer, D.: Detecting unwanted synchronization in Java programs. In: Conf. on Software Engineering and Applications, pp. 122\u2013132 (2004)"},{"issue":"6","key":"4_CR16","doi-asserted-by":"publisher","first-page":"1811","DOI":"10.1145\/197320.197383","volume":"16","author":"B. Liskov","year":"1994","unstructured":"Liskov, B., Wing, J.M.: A behavioral notion of subtyping. ACM Trans. Program. Lang. Syst.\u00a016(6), 1811\u20131841 (1994)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"4_CR17","unstructured":"Meyer, B.: Object-Oriented Software Construction, 2nd edn. Prentice Hall International (1997)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Palsberg, J., Schwartzbach, M.I.: Object-oriented type inference. In: Proc. of OOPSLA, pp. 146\u2013161 (1991)","DOI":"10.1145\/117954.117965"},{"issue":"12","key":"4_CR19","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1145\/361598.361623","volume":"15","author":"D.L. Parnas","year":"1972","unstructured":"Parnas, D.L.: On the criteria to be used in decomposing systems into modules. Commun. ACM\u00a015(12), 1053\u20131058 (1972)","journal-title":"Commun. ACM"},{"key":"4_CR20","unstructured":"BC Pierce Types and Programming Languages. MIT Press (2002)"},{"issue":"5","key":"4_CR21","doi-asserted-by":"crossref","first-page":"75","DOI":"10.5381\/jot.2005.4.5.a1","volume":"4","author":"F. Steimann","year":"2005","unstructured":"Steimann, F., Mayer, P.: Patterns of interface-based programming. Journal of Object Technology\u00a04(5), 75\u201394 (2005)","journal-title":"Journal of Object Technology"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Steimann, F.: The paradoxical success of aspect-oriented programming. In: OOPSLA, pp. 481\u2013497 (2006)","DOI":"10.1145\/1167473.1167514"},{"issue":"2","key":"4_CR23","doi-asserted-by":"crossref","first-page":"67","DOI":"10.5381\/jot.2007.6.2.a5","volume":"6","author":"F. Steimann","year":"2007","unstructured":"Steimann, F.: The Infer Type refactoring and its use for interface-based programming. Journal of Object Technology\u00a06(2), 67\u201389 (2007)","journal-title":"Journal of Object Technology"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-74061-2_1","volume-title":"Static Analysis","author":"F. Tip","year":"2007","unstructured":"Tip, F.: Refactoring using type constraints. In: Riis Nielson, H., Fil\u00e9, G. (eds.) SAS 2007. LNCS, vol.\u00a04634, pp. 1\u201317. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Business Information Processing","Objects, Components, Models and Patterns"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69824-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T12:29:28Z","timestamp":1557664168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69824-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540698234","9783540698241"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69824-1_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2008]]}}}