{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:54:41Z","timestamp":1725504881547},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540786627"},{"type":"electronic","value":"9783540786634"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78663-4_7","type":"book-chapter","created":{"date-parts":[[2008,3,8]],"date-time":"2008-03-08T06:00:01Z","timestamp":1204956001000},"page":"73-89","source":"Crossref","is-referenced-by-count":3,"title":["Relational Analysis for Delivery of Services"],"prefix":"10.1007","author":[{"given":"Flemming","family":"Nielson","sequence":"first","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"J\u00f6rg","family":"Bauer","sequence":"additional","affiliation":[]},{"given":"Christoffer Rosenkilde","family":"Nielsen","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Pilegaard","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1006\/inco.2000.3020","volume":"168","author":"C. Bodei","year":"2001","unstructured":"Bodei, C., Degano, P., Nielson, F., Nielson, H.R.: Static analysis for the \u03c0-calculus with applications to security. Information and Computation\u00a0168, 68\u201392 (2001)","journal-title":"Information and Computation"},{"issue":"3","key":"7_CR2","doi-asserted-by":"crossref","first-page":"347","DOI":"10.3233\/JCS-2005-13302","volume":"13","author":"C. Bodei","year":"2005","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. J. Comput. Secur.\u00a013(3), 347\u2013390 (2005)","journal-title":"J. Comput. Secur."},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/11841197_3","volume-title":"Web Services and Formal Methods","author":"M. Boreale","year":"2006","unstructured":"Boreale, M., Bruni, R., Caires, L., De Nicola, R., Lanese, I., Loreti, M., Martins, F., Montanari, U., Ravara, A., Sangiorgi, D., Vasconcelos, V., Zavattaro, G.: SCC: A Service Centered Calculus. In: Bravetti, M., N\u00fa\u00f1ez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol.\u00a04184, pp. 38\u201357. Springer, Heidelberg (2006)"},{"issue":"3","key":"7_CR4","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0743-1066(84)90014-1","volume":"1","author":"W.F. Dowling","year":"1984","unstructured":"Dowling, W.F., Gallier, J.H.: Linear-time algorithms for testing the satisfiability of propositional horn formulae. J. Log. Program.\u00a01(3), 267\u2013284 (1984)","journal-title":"J. Log. Program."},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/3-540-45927-8_22","volume-title":"Programming Languages and Systems","author":"J. Feret","year":"2002","unstructured":"Feret, J.: Dependency analysis of mobile systems. In: Le M\u00e9tayer, D. (ed.) ESOP 2002 and ETAPS 2002. LNCS, vol.\u00a02305, pp. 314\u2013330. Springer, Heidelberg (2002)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/11948148_27","volume-title":"Service-Oriented Computing \u2013 ICSOC 2006","author":"C. Guidi","year":"2006","unstructured":"Guidi, C., Lucchi, R., Gorrieri, R., Busi, N., Zavattaro, G.: A calculus for service oriented computing. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol.\u00a04294, pp. 327\u2013338. Springer, Heidelberg (2006)"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/ARES.2006.115","volume-title":"Availability, Reliability and Security (ARES)","author":"R.R. Hansen","year":"2006","unstructured":"Hansen, R.R., Probst, C.W., Nielson, F.: Sandboxing in myklaim. In: Availability, Reliability and Security (ARES), pp. 174\u2013181. IEEE Computer Society, Los Alamitos (2006)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71316-6_4","volume-title":"Programming Languages and Systems","author":"A. Lapadula","year":"2007","unstructured":"Lapadula, A., Pugliese, R., Tiezzi, F.: A calculus for orchestration of web services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol.\u00a04421, Springer, Heidelberg (2007)"},{"key":"7_CR9","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-642-58041-3_6","volume-title":"Logic and Algebra of Specification","author":"R. Milner","year":"1993","unstructured":"Milner, R.: The polyadic pi-calculus: A tutorial. In: Bauer, F.L., Brauer, W., Schwichtenberg, H. (eds.) Logic and Algebra of Specification, pp. 203\u2013246. Springer, Heidelberg (1993)"},{"key":"7_CR10","volume-title":"Communicating and Mobile Systems: The Pi-Calculus","author":"R. Milner","year":"1999","unstructured":"Milner, R.: Communicating and Mobile Systems: The Pi-Calculus. Cambridge University Press, Cambridge (1999)"},{"doi-asserted-by":"crossref","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.L.: Principles of Program Analysis. Springer, Heidelberg (1999) (second printing, 2005)","key":"7_CR11","DOI":"10.1007\/978-3-662-03811-6"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1571-0661(04)00316-0","volume":"62","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Nielson, H.R., Seidl, H.: Cryptographic analysis in cubic time. Electronic Notes of Theoretical Computer Science\u00a062, 7\u201323 (2002)","journal-title":"Electronic Notes of Theoretical Computer Science"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-540-24730-2_21","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"F. Nielson","year":"2004","unstructured":"Nielson, F., Nielson, H.R., Sun, H., Buchholtz, M., Hansen, R.R., Pilegaard, H., Seidl, H.: The Succinct Solver Suite. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 251\u2013265. Springer, Heidelberg (2004)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-45309-1_17","volume-title":"Programming Languages and Systems","author":"F. Nielson","year":"2001","unstructured":"Nielson, F., Seidl, H.: Control-flow analysis in cubic time. In: Sands, D. (ed.) ESOP 2001 and ETAPS 2001. LNCS, vol.\u00a02028, pp. 252\u2013268. Springer, Heidelberg (2001)"},{"issue":"4","key":"7_CR15","first-page":"335","volume":"9","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Seidl, H., Nielson, H.R.: A succinct solver for ALFP. Nord. J. Comput.\u00a09(4), 335\u2013372 (2002)","journal-title":"Nord. J. Comput."},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/3-540-49727-7_9","volume-title":"Static Analysis","author":"A. Venet","year":"1998","unstructured":"Venet, A.: Automatic determination of communication topologies in mobile systems. In: Levi, G. (ed.) SAS 1998. LNCS, vol.\u00a01503, pp. 152\u2013167. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78663-4_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:17:54Z","timestamp":1619522274000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78663-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540786627","9783540786634"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78663-4_7","relation":{},"subject":[]}}