{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:32Z","timestamp":1725899972543},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642138683"},{"type":"electronic","value":"9783642138690"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13869-0_29","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:24:20Z","timestamp":1277810660000},"page":"396-416","source":"Crossref","is-referenced-by-count":0,"title":["Software on the Witness Stand: What Should It Take for Us to Trust It?"],"prefix":"10.1007","author":[{"given":"Sergey","family":"Bratus","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ashlyn","family":"Lembree","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anna","family":"Shubina","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"1","key":"29_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2004.1264851","volume":"2","author":"J. Bannet","year":"2004","unstructured":"Bannet, J., Price, D.W., Rudys, A., Singer, J., Wallach, D.S.: Hack-a-vote: Demonstrating security issues with electronic voting systems. IEEE Security and Privacy Magazine\u00a02(1), 32\u201337 (2004)","journal-title":"IEEE Security and Privacy Magazine"},{"issue":"5","key":"29_CR2","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"G.J. Holzmann","year":"1997","unstructured":"Holzmann, G.J., et al.: The model checker SPIN. IEEE Transactions on software engineering\u00a023(5), 279\u2013295 (1997)","journal-title":"IEEE Transactions on software engineering"},{"key":"29_CR3","doi-asserted-by":"crossref","first-page":"1983","DOI":"10.1145\/1283920.1283940","volume-title":"ACM Turing award lectures","author":"K. Thompson","year":"2007","unstructured":"Thompson, K.: Reflections on trusting trust. In: ACM Turing award lectures, p. 1983. ACM, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13869-0_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:14:58Z","timestamp":1619784898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13869-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138683","9783642138690"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13869-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}