{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:48:39Z","timestamp":1725547719002},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642118104"},{"type":"electronic","value":"9783642118111"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11811-1_20","type":"book-chapter","created":{"date-parts":[[2010,2,19]],"date-time":"2010-02-19T11:57:22Z","timestamp":1266580642000},"page":"259-272","source":"Crossref","is-referenced-by-count":10,"title":["Matelas: A Predicate Calculus Common Formal Definition for Social Networking"],"prefix":"10.1007","author":[{"given":"Nestor","family":"Catano","sequence":"first","affiliation":[]},{"given":"Camilo","family":"Rueda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511624162","volume-title":"The B-Book: Assigning Programs to Meanings","author":"J.R. Abrial","year":"1996","unstructured":"Abrial, J.R.: The B-Book: Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/BFb0053357","volume-title":"B\u201998: Recent Advances in the Development and Use of the B Method","author":"J.-R. Abrial","year":"1998","unstructured":"Abrial, J.-R., Mussat, L.: Introducing dynamic constraints in B. In: Bert, D. (ed.) B 1998. LNCS, vol.\u00a01393, pp. 83\u2013128. Springer, Heidelberg (1998)"},{"issue":"1,2","key":"20_CR3","first-page":"1","volume":"77","author":"J.R. Abrial","year":"2007","unstructured":"Abrial, J.R., Hallerstede, S.: Refinement, decomposition and instantiation of discrete models: Application to Event-B. Fundamentae Informatica\u00a077(1,2), 1\u201324 (2007)","journal-title":"Fundamentae Informatica"},{"key":"20_CR4","unstructured":"Allen, A.L.: Uneasy Access: Privacy for Women in a Free Society. Rowman and Littlefield (1988)"},{"key":"20_CR5","unstructured":"Atelier b, http:\/\/www.atelierb.eu\/index_en.html"},{"key":"20_CR6","unstructured":"Baudin, P., Filli\u00e2tre, J.-C., March\u00e9, C., Monate, B., Moy, Y., Prevosto, V.: ACSL: ANSI\/ISO C specification language, http:\/\/frama-c.cea.fr\/download\/-plug-indevelopmentguide.pdf"},{"key":"20_CR7","unstructured":"Benisch, M., Sadeh, N., Sandholm, T.: A theory of expressiveness in mechanisms. In: Proceeding of the 23rd Conference on Artificial Intelligence (July 2008)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Bouquet, F., Dadeau, F., Julien, J.: JML2B: Checking JML specifications with B machines. In: The 7th International B Conference, pp. 285\u2013288 (2007)","DOI":"10.1007\/11955757_31"},{"issue":"1-3","key":"20_CR9","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.scico.2004.05.011","volume":"55","author":"C. Breunesse","year":"2005","unstructured":"Breunesse, C., Catano, N., Huisman, M., Jacobs, B.: Formal methods for smart cards: An experience report. Science of Computer Programming\u00a055(1-3), 53\u201380 (2005)","journal-title":"Science of Computer Programming"},{"key":"20_CR10","unstructured":"B Tools, http:\/\/www.b-core.com\/btool.html"},{"issue":"3","key":"20_CR11","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/s10009-004-0167-4","volume":"7","author":"L. Burdy","year":"2005","unstructured":"Burdy, L., Cheon, Y., Cok, D., Ernst, M., Kiniry, J., Leavens, G.T., Leino, K.R.M., Poll, E.: An overview of JML tools and applications. International Journal on Software Tools for Technology Transfer (STTT)\u00a07(3), 212\u2013232 (2005)","journal-title":"International Journal on Software Tools for Technology Transfer (STTT)"},{"key":"20_CR12","unstructured":"Catano, N., Kostakos, V., Oakley, I.: Poporo: A formal framework for social networking. In: 3rd International Workshop on Formal Methods for Interactive Systems (FMIS), Eindhoven, The Netherlands (November 2009) (to appear)"},{"key":"20_CR13","volume-title":"Web Privacy with P3p","author":"L. Cranor","year":"2002","unstructured":"Cranor, L., Lessig, L.: Web Privacy with P3p. O\u2019Reilly & Associates, Inc., Sebastopol (2002)"},{"key":"20_CR14","unstructured":"Facebook\u2019s statistics, http:\/\/www.facebook.com\/press\/info.php?statistics"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/11955757_11","volume-title":"B 2007: Formal Specification and Development in B","author":"J. Groslambert","year":"2006","unstructured":"Groslambert, J.: Verification of LTL on B event systems. In: Julliand, J., Kouchnarenko, O. (eds.) B 2007. LNCS, vol.\u00a04355, pp. 109\u2013124. Springer, Heidelberg (2006)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Workshop on Privacy in the Electronic Society (WPES), pp. 71\u201380 (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/3-540-16442-1_14","volume-title":"ESOP 86","author":"J. He","year":"1986","unstructured":"He, J., Hoare, C.A.R., Sanders, J.W.: Data refinement refined. In: Robinet, B., Wilhelm, R. (eds.) ESOP 1986. LNCS, vol.\u00a0213, pp. 187\u2013196. Springer, Heidelberg (1986)"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/BF00289507","volume":"1","author":"C.A.R. Hoare","year":"1972","unstructured":"Hoare, C.A.R.: Proof of correctness of data representations. Acta Informatica\u00a01, 271\u2013281 (1972)","journal-title":"Acta Informatica"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Jagadeesan, R., Marrero, W., Pitcher, C., Saraswat, V.A.: Timed constraint programming: a declarative approach to usage control. In: Proceeding of Principles and Practice of Declarative Programming (PPDP), pp. 164\u2013175 (2005)","DOI":"10.1145\/1069774.1069790"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof-carrying code. In: Symposium on Principles of Programming Languages (POPL), Paris, January 1997, p. 106119 (1997)","DOI":"10.1145\/263699.263712"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Necula, G., Lee, P.: Research on proof-carrying code for untrusted-code security. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, p. 204 (1997)","DOI":"10.1145\/263699.263712"},{"key":"20_CR22","unstructured":"ProB, http:\/\/users.ecs.soton.ac.uk\/mal\/systems\/prob.html"},{"key":"20_CR23","volume-title":"Handbook of Automated Reasoning","author":"A. Robinson","year":"2001","unstructured":"Robinson, A., Voronkov, A.: Handbook of Automated Reasoning. MIT Press, Cambridge (2001)"},{"key":"20_CR24","unstructured":"Rodin, http:\/\/www.event-b.org\/platform.html"},{"key":"20_CR25","unstructured":"Schneider, S.: The B-Method: An Introduction. Palgrave (2001)"},{"key":"20_CR26","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511625138","volume-title":"Philosophical Dimensions of Privacy: An Anthology","author":"F.D. Schoeman","year":"1984","unstructured":"Schoeman, F.D.: Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge (1984)"}],"container-title":["Lecture Notes in Computer Science","Abstract State Machines, Alloy, B and Z"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11811-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T09:34:55Z","timestamp":1685439295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11811-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642118104","9783642118111"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11811-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}