{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:48:16Z","timestamp":1725540496332},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642103728"},{"type":"electronic","value":"9783642103735"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10373-5_14","type":"book-chapter","created":{"date-parts":[[2009,11,16]],"date-time":"2009-11-16T06:45:27Z","timestamp":1258353927000},"page":"266-285","source":"Crossref","is-referenced-by-count":9,"title":["Development of Security Software: A High Assurance Methodology"],"prefix":"10.1007","author":[{"given":"David","family":"Hardin","sequence":"first","affiliation":[]},{"given":"T. Douglas","family":"Hiratzka","sequence":"additional","affiliation":[]},{"given":"D. Randolph","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Lucas","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Whalen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"AdaCore Inc, Tokeneer product description at AdaCore, \n                    \n                      http:\/\/www.adacore.com\/home\/products\/sparkpro\/tokeneer\/"},{"key":"14_CR2","unstructured":"Barnes, J., Chapman, R., Johnson, R., Widmaier, J., Cooper, D., Everett, W.: Engineering the Tokeneer Enclave Protection Software. In: Proceedings of IEEE International Symposium on Secure Software Engineering (ISSSE) (2006)"},{"key":"14_CR3","unstructured":"Esterel Technologies, Inc., SCADE Suite product description, \n                    \n                      http:\/\/www.esterel-technologies.com\/products\/scade-suite"},{"key":"14_CR4","unstructured":"Greve, D., Richards, R., Wilding, M.: A Summary of Intrinsic Partitioning Verification. In: Proceedings of ACL 2004, Austin, TX (November 2004)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Hardin, D.: Invited Tutorial: Considerations in the Design and Verification of Microprocessors for Safety-Critical and Security-Critical Applications. In: Cimatti, A., Jones, R. (eds.) Proceedings of the Eighth International Conference on Formal Methods in Computer-Aided Design (FMCAD 2008), pp. 1\u20138 (November 2008)","DOI":"10.1109\/FMCAD.2008.ECP.5"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/11901433_34","volume-title":"Formal Methods and Software Engineering","author":"T. McComb","year":"2006","unstructured":"McComb, T., Wildman, L.: Verifying Abstract Information Flow Properties in Fault Tolerant Security Devices. In: Liu, Z., He, J. (eds.) ICFEM 2006. LNCS, vol.\u00a04260, pp. 621\u2013638. Springer, Heidelberg (2006)"},{"key":"14_CR7","unstructured":"Prover Technologies, Inc. Prover SL\/DE plug-in product description, \n                    \n                      http:\/\/www.prover.com\/products\/prover_plugin"},{"key":"14_CR8","unstructured":"Reactive Systems, Inc. Reactis product description, \n                    \n                      http:\/\/www.reactive-systems.com"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/BFb0027284","volume-title":"ZUM\u201997: The Z Formal Specification Notation","author":"M. Saaltink","year":"1997","unstructured":"Saaltink, M.: The Z\/EVES System. In: Bowen, J.P., Hinchey, M.G., Till, D. (eds.) ZUM 1997. LNCS, vol.\u00a01212, pp. 72\u201386. Springer, Heidelberg (1997)"},{"key":"14_CR10","series-title":"International Series in Computer Science","volume-title":"The Z Notation: A Reference Manual","author":"J.M. Spivey","year":"1992","unstructured":"Spivey, J.M.: The Z Notation: A Reference Manual, 2nd edn. International Series in Computer Science. Prentice Hall, Englewood Cliffs (1992)","edition":"2"},{"key":"14_CR11","unstructured":"The Mathworks, Inc., Simulink product description, \n                    \n                      http:\/\/www.mathworks.com\/Simulink"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-79707-4_7","volume-title":"Formal Methods for Industrial Critical Systems","author":"M. Whalen","year":"2008","unstructured":"Whalen, M., Cofer, D., Miller, S., Krogh, B.H., Storm, W.: Integration of formal analysis into a model-based software development process. In: Leue, S., Merino, P. (eds.) FMICS 2007. LNCS, vol.\u00a04916, pp. 68\u201384. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10373-5_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:28:50Z","timestamp":1619767730000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10373-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642103728","9783642103735"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10373-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}