{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:13:03Z","timestamp":1725549183839},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642120312"},{"type":"electronic","value":"9783642120329"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12032-9_14","type":"book-chapter","created":{"date-parts":[[2010,3,8]],"date-time":"2010-03-08T01:07:56Z","timestamp":1268010476000},"page":"191-205","source":"Crossref","is-referenced-by-count":7,"title":["Model Checking Is Static Analysis of Modal Logic"],"prefix":"10.1007","author":[{"given":"Flemming","family":"Nielson","sequence":"first","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/B978-0-934613-40-8.50006-3","volume-title":"Foundations of Deductive Databases and Logic Programming","author":"K. Apt","year":"1988","unstructured":"Apt, K., Blair, H., Walker, A.: A theory of declarative programming. In: Foundations of Deductive Databases and Logic Programming, pp. 89\u2013148. Morgan-Kaufman, San Francisco (1988)"},{"key":"14_CR2","volume-title":"Principles of Model Checking","author":"C. Baier","year":"2008","unstructured":"Baier, C., Katoen, J.-P.: Principles of Model Checking. MIT Press, Cambridge (2008)"},{"issue":"3","key":"14_CR3","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/0743-1066(87)90004-5","volume":"4","author":"I. Balbin","year":"1987","unstructured":"Balbin, I., Ramamohanarao, K.: A generalization of the differential approach to recursive query evaluation. Journal of Logic Programming\u00a04(3), 259\u2013262 (1987)","journal-title":"Journal of Logic Programming"},{"key":"14_CR4","doi-asserted-by":"crossref","first-page":"347","DOI":"10.3233\/JCS-2005-13302","volume":"13","author":"C. Bodei","year":"2005","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Static validation of security protocols. Journal of Computer Security\u00a013, 347\u2013390 (2005)","journal-title":"Journal of Computer Security"},{"issue":"2","key":"14_CR5","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(80)90032-X","volume":"21","author":"A. Chandra","year":"1980","unstructured":"Chandra, A., Harel, D.: Computable queries for relational data bases. Journal of Computer and System Sciences\u00a021(2), 156\u2013178 (1980)","journal-title":"Journal of Computer and System Sciences"},{"unstructured":"Le Charlier, B., Van Hentenryck, P.: A universal top-down fixpoint algorithm. Technical report, CS-92-25, Brown University (1992)","key":"14_CR6"},{"issue":"4","key":"14_CR7","first-page":"304","volume":"5","author":"C. Fecht","year":"1998","unstructured":"Fecht, C., Seidl, H.: Propagating differences: An efficient new fixpoint algorithm for distributive constraint systems. Nordic Journal of Computing\u00a05(4), 304\u2013329 (1998)","journal-title":"Nordic Journal of Computing"},{"key":"14_CR8","volume-title":"Computer Security Foundations Symposium","author":"C. Hankin","year":"2009","unstructured":"Hankin, C., Nielson, F., Riis Nielson, H.: Advice from Belnap policies. In: Computer Security Foundations Symposium. IEEE Computer Society, Los Alamitos (2009)"},{"key":"14_CR9","volume-title":"Flow Analysis of Computer Programs","author":"M.S. Hecht","year":"1977","unstructured":"Hecht, M.S.: Flow Analysis of Computer Programs. North Holland, Amsterdam (1977)"},{"key":"14_CR10","volume-title":"Model Checking","author":"E.M. Clarke Jr.","year":"1999","unstructured":"Clarke Jr., E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11688839_9","volume-title":"Compiler Construction","author":"A.-L. Lamprecht","year":"2006","unstructured":"Lamprecht, A.-L., Margaria, T., Steffen, B.: Data-flow analysis as model checking within the jABC. In: Mycroft, A., Zeller, A. (eds.) CC 2006. LNCS, vol.\u00a03923, pp. 101\u2013104. Springer, Heidelberg (2006)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/3-540-53479-2_17","volume-title":"Semantics of Systems of Concurrent Processes","author":"R. Nicola De","year":"1990","unstructured":"De Nicola, R., Vaandrager, F.W.: Action versus state based logics for transition systems. In: Guessarian, I. (ed.) LITP 1990. LNCS, vol.\u00a0469, pp. 407\u2013419. Springer, Heidelberg (1990)"},{"key":"14_CR13","volume-title":"Principles of Program Analysis","author":"F. Nielson","year":"2005","unstructured":"Nielson, F., Riis Nielson, H., Hankin, C.: Principles of Program Analysis, 2nd edn. Springer, Berlin (2005)","edition":"2"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/S0304-3975(01)00140-2","volume":"283","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Riis Nielson, H., Hansen, R.R.: Validating firewalls using flow logics. Theoretical Computer Science\u00a0283(2), 381\u2013418 (2002)","journal-title":"Theoretical Computer Science"},{"key":"14_CR15","first-page":"335","volume":"9","author":"F. Nielson","year":"2002","unstructured":"Nielson, F., Riis Nielson, H., Seidl, H.: A succinct solver for ALFP. Nordic Journal of Computing\u00a09, 335\u2013372 (2002)","journal-title":"Nordic Journal of Computing"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-540-24730-2_21","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"F. Nielson","year":"2004","unstructured":"Nielson, F., Riis Nielson, H., Sun, H., Buchholtz, M., Hansen, R.R., Pilegaard, H., Seidl, H.: The Succinct Solver Suite. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 251\u2013265. Springer, Heidelberg (2004)"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-36377-7_11","volume-title":"The Essence of Computation","author":"H. Riis Nielson","year":"2002","unstructured":"Riis Nielson, H., Nielson, F.: Flow Logic: a multi-paradigmatic approach to static analysis. In: Mogensen, T.\u00c6., Schmidt, D.A., Sudborough, I.H. (eds.) The Essence of Computation. LNCS, vol.\u00a02566, pp. 223\u2013244. Springer, Heidelberg (2002)"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-540-27864-1_8","volume-title":"Static Analysis","author":"H. Riis Nielson","year":"2004","unstructured":"Riis Nielson, H., Nielson, F., Pilegaard, H.: Spatial analysis of BioAmbients. In: Giacobazzi, R. (ed.) SAS 2004. LNCS, vol.\u00a03148, pp. 69\u201383. Springer, Heidelberg (2004)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/3-540-52592-0_54","volume-title":"ESOP \u201990","author":"R. Paige","year":"1990","unstructured":"Paige, R.: Symbolic finite differencing - part i. In: Jones, N.D. (ed.) ESOP 1990. LNCS, vol.\u00a0432, pp. 36\u201356. Springer, Heidelberg (1990)"},{"doi-asserted-by":"crossref","unstructured":"Schmidt, D.A.: Data flow analysis is model checking of abstract interpretations. In: POPL 1998, pp. 38\u201348 (1998)","key":"14_CR20","DOI":"10.1145\/268946.268950"},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-49727-7_22","volume-title":"Static Analysis","author":"D.A. Schmidt","year":"1998","unstructured":"Schmidt, D.A., Steffen, B.: Program analysis as model checking of abstract interpretations. In: Levi, G. (ed.) SAS 1998. LNCS, vol.\u00a01503, pp. 351\u2013380. Springer, Heidelberg (1998)"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/3-540-54415-1_54","volume-title":"Theoretical Aspects of Computer Software","author":"B. Steffen","year":"1991","unstructured":"Steffen, B.: Data flow analysis as model checking. In: Ito, T., Meyer, A.R. (eds.) TACS 1991. LNCS, vol.\u00a0526, pp. 346\u2013365. Springer, Heidelberg (1991)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Software Science and Computational Structures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12032-9_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:46:59Z","timestamp":1606186019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12032-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642120312","9783642120329"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12032-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}