{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:15:08Z","timestamp":1759637708343},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642113185"},{"type":"electronic","value":"9783642113192"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11319-2_23","type":"book-chapter","created":{"date-parts":[[2010,1,6]],"date-time":"2010-01-06T05:00:05Z","timestamp":1262754005000},"page":"312-327","source":"Crossref","is-referenced-by-count":11,"title":["Model-Checking In-Lined Reference Monitors"],"prefix":"10.1007","author":[{"given":"Meera","family":"Sridhar","sequence":"first","affiliation":[]},{"given":"Kevin W.","family":"Hamlen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.scico.2008.09.004","volume":"74","author":"I. Aktug","year":"2008","unstructured":"Aktug, I., Naliuka, K.: ConSpec - a formal language for policy specification. Science of Computer Programming\u00a074, 2\u201312 (2008)","journal-title":"Science of Computer Programming"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/BF01782772","volume":"2","author":"B. Alpern","year":"1986","unstructured":"Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Distributed Computing\u00a02, 117\u2013126 (1986)","journal-title":"Distributed Computing"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/11513988_17","volume-title":"Computer Aided Verification","author":"G. Balakrishnan","year":"2005","unstructured":"Balakrishnan, G., Reps, T.W., Kidd, N., Lal, A., Lim, J., Melski, D., Gruian, R., Yong, S.H., Chen, C.-H., Teitelbaum, T.: Model checking x86 executables with CodeSurfer\/x86 and WPDS++. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 158\u2013163. Springer, Heidelberg (2005)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11609773_12","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"B.-Y.E. Chang","year":"2005","unstructured":"Chang, B.-Y.E., Chlipala, A., Necula, G.C.: A framework for certified program analysis and its applications to mobile-code safety. In: Emerson, E.A., Namjoshi, K.S. (eds.) VMCAI 2006. LNCS, vol.\u00a03855, pp. 174\u2013189. Springer, Heidelberg (2005)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1007\/978-3-540-31980-1_36","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"F. Chen","year":"2005","unstructured":"Chen, F.: Java-MOP: A monitoring oriented programming environment for Java. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 546\u2013550. Springer, Heidelberg (2005)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proc. Symposium on Principles of Prog. Languages, pp. 234\u2013252 (1977)","DOI":"10.1145\/512950.512973"},{"issue":"4","key":"23_CR7","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1093\/logcom\/2.4.511","volume":"2","author":"P. Cousot","year":"1992","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation frameworks. J. Log. Comput.\u00a02(4), 511\u2013547 (1992)","journal-title":"J. Log. Comput."},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-44693-1_13","volume-title":"STACS 2001","author":"F. Denis","year":"2001","unstructured":"Denis, F., Lemay, A., Terlutte, A.: Residual finite state automata. In: Ferreira, A., Reichel, H. (eds.) STACS 2001. LNCS, vol.\u00a02010, pp. 144\u2013157. Springer, Heidelberg (2001)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"DeVries, B.W., Gupta, G., Hamlen, K.W., Moore, S., Sridhar, M.: ActionScript bytecode verification with co-logic programming. In: Proc. ACM Workshop on Prog. Languages and Analysis for Security (PLAS) (2009)","DOI":"10.1145\/1554339.1554342"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Schneider, F.B.: SASI enforcement of security policies: A retrospective. In: Proc. New Security Paradigms Workshop (1999)","DOI":"10.1145\/335169.335201"},{"key":"23_CR11","unstructured":"fukami, Fuhrmannek, B.: SWF and the malware tragedy. In: Proc. OWASP Application Security Conference (2008)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Hamlen, K.W., Jones, M.: Aspect-oriented in-lined reference monitors. In: Proc. ACM Workshop on Prog. Languages and Analysis for Security (PLAS) (2008)","DOI":"10.1145\/1375696.1375699"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Certified in-lined reference monitoring on.NET. In: Proc. ACM Workshop on Prog. Languages and Analysis for Security (PLAS) (2006)","DOI":"10.1145\/1134744.1134748"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. In: ACM Trans. Prog. Languages and Systems (2006)","DOI":"10.1145\/1111596.1111601"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Kisser, W., Havelund, K., Brat, G., Park, S., Lerda, F.: Model checking programs. Automated Software Engineering Journal\u00a010(2) (April 2003)","DOI":"10.1023\/A:1022920129859"},{"issue":"1","key":"23_CR16","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.entcs.2007.02.066","volume":"190","author":"T.C. Ruys","year":"2007","unstructured":"Ruys, T.C., de Brugh, N.H.M.A.: MMC: the Mono Model Checker. Electron. Notes Theor. Comput. Sci.\u00a0190(1), 149\u2013160 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Information and System Security\u00a03, 30\u201350 (2000)","journal-title":"ACM Trans. Information and System Security"},{"key":"23_CR18","volume-title":"The Art of PROLOG: Advanced Programming Techniques","author":"L. Shapiro","year":"1994","unstructured":"Shapiro, L., Sterling, E.Y.: The Art of PROLOG: Advanced Programming Techniques. MIT Press, Cambridge (1994)"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/11799573_25","volume-title":"Logic Programming","author":"L. Simon","year":"2006","unstructured":"Simon, L., Mallya, A., Bansal, A., Gupta, G.: Coinductive logic programming. In: Etalle, S., Truszczy\u0144ski, M. (eds.) ICLP 2006. LNCS, vol.\u00a04079, pp. 330\u2013345. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11319-2_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T11:00:45Z","timestamp":1685358045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11319-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642113185","9783642113192"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11319-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}