{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:21:52Z","timestamp":1725574912581},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642180699"},{"type":"electronic","value":"9783642180705"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18070-5_8","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T14:18:02Z","timestamp":1295101082000},"page":"107-121","source":"Crossref","is-referenced-by-count":7,"title":["CVPP: A Tool Set for Compositional Verification of Control\u2013Flow Safety Properties"],"prefix":"10.1007","author":[{"given":"Marieke","family":"Huisman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dilian","family":"Gurov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","first-page":"151","volume-title":"Logic in Computer Science (LICS 2007)","author":"R. Alur","year":"2007","unstructured":"Alur, R., Arenas, M., Barcelo, P., Etessami, K., Immerman, N., Libkin, L.: First-order and temporal logics for nested words. In: Logic in Computer Science (LICS 2007), Washington, DC, USA, pp. 151\u2013160. IEEE Computer Society, Los Alamitos (2007)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-11319-2_7","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"R. Alur","year":"2010","unstructured":"Alur, R., Chaudhuri, S.: Temporal reasoning for procedural programs. In: Barthe, G., Hermenegildo, M. (eds.) VMCAI 2010. LNCS, vol.\u00a05944, pp. 45\u201360. Springer, Heidelberg (2010)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-540-24730-2_35","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"R. Alur","year":"2004","unstructured":"Alur, R., Etessami, K., Madhusudan, P.: A temporal logic of nested calls and returns. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 467\u2013481. Springer, Heidelberg (2004)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-30569-9_3","volume-title":"Construction and Analysis of Safe, Secure, and Interoperable Smart Devices","author":"M. Barnett","year":"2005","unstructured":"Barnett, M., Leino, K.R.M., Schulte, W.: The Spec# Programming System: An Overview. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, vol.\u00a03362, pp. 49\u201369. Springer, Heidelberg (2005)"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0304-3975(92)90276-L","volume":"106","author":"G. Boudol","year":"1992","unstructured":"Boudol, G., Larsen, K.: Graphical versus logical specifications. Theoretical Computer Science\u00a0106, 3\u201320 (1992)","journal-title":"Theoretical Computer Science"},{"key":"8_CR6","unstructured":"Chugunov, G., Fredlund, L.-\u00c5., Gurov, D.: Model checking of multi-applet JavaCard applications. In: Smart Card Research and Advanced Application Conference (CARDIS 2002), pp. 87\u201395. USENIX Publications (2002)"},{"key":"8_CR7","first-page":"287","volume-title":"International Symposium on Protocol Specification, Testing and Verification","author":"R. Cleaveland","year":"1990","unstructured":"Cleaveland, R., Parrow, J., Steffen, B.: A semantics based verification tool for finite state systems. In: International Symposium on Protocol Specification, Testing and Verification, pp. 287\u2013302. North-Holland Publishing Co., Amsterdam (1990)"},{"key":"8_CR8","first-page":"57","volume-title":"Programming Language Design and Implementation (PLDI 2002)","author":"M. Das","year":"2002","unstructured":"Das, M., Lerner, S., Seigle, M.: ESP: Path\u2013sensitive program verification in polynomial time. In: Programming Language Design and Implementation (PLDI 2002), pp. 57\u201368. ACM, New York (2002)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-540-71209-1_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M. Goldman","year":"2007","unstructured":"Goldman, M., Katz, S.: MAVEN: Modular aspect verification. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 308\u2013322. Springer, Heidelberg (2007)"},{"issue":"3","key":"8_CR10","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1145\/177492.177725","volume":"16","author":"O. Grumberg","year":"1994","unstructured":"Grumberg, O., Long, D.: Model checking and modular verification. ACM TOPLAS\u00a016(3), 843\u2013871 (1994)","journal-title":"ACM TOPLAS"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Gurov, D., Huisman, M.: Interface abstraction for compositional verification. In: Software Engineering and Formal Methods (SEFM 2005), pp. 414\u2013423 (2005)","DOI":"10.1109\/SEFM.2005.24"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-540-93900-9_14","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"D. Gurov","year":"2009","unstructured":"Gurov, D., Huisman, M.: Reducing behavioural to structural properties of programs with procedures. In: Jones, N.D., M\u00fcller-Olm, M. (eds.) VMCAI 2009. LNCS, vol.\u00a05403, pp. 136\u2013150. Springer, Heidelberg (2009)"},{"key":"#cr-split#-8_CR13.1","unstructured":"Gurov, D., Huisman, M.: Reducing behavioural to structural properties of programs with procedures (2010);"},{"key":"#cr-split#-8_CR13.2","unstructured":"Full version, available upon request"},{"issue":"7","key":"8_CR14","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.ic.2008.03.003","volume":"206","author":"D. Gurov","year":"2008","unstructured":"Gurov, D., Huisman, M., Sprenger, C.: Compositional verification of sequential programs with procedures. Information and Computation\u00a0206(7), 840\u2013868 (2008)","journal-title":"Information and Computation"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-88194-0_11","volume-title":"Formal Methods and Software Engineering","author":"M. Huisman","year":"2008","unstructured":"Huisman, M., Aktug, I., Gurov, D.: Program models for compositional verification. In: Liu, S., Araki, K. (eds.) ICFEM 2008. LNCS, vol.\u00a05256, pp. 147\u2013166. Springer, Heidelberg (2008)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-24721-0_6","volume-title":"Fundamental Approaches to Software Engineering","author":"M. Huisman","year":"2004","unstructured":"Huisman, M., Gurov, D., Sprenger, C., Chugunov, G.: Checking absence of illicit applet interactions: A\u00a0case\u00a0study. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol.\u00a02984, pp. 84\u201398. Springer, Heidelberg (2004)"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/0304-3975(82)90125-6","volume":"27","author":"D. Kozen","year":"1983","unstructured":"Kozen, D.: Results on the propositional \u03bc-calculus. Theoretical Computer Science\u00a027, 333\u2013354 (1983)","journal-title":"Theoretical Computer Science"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45651-1","volume-title":"Modular Specification and Verification of Object-Oriented Programs","author":"P. M\u00fcller","year":"2002","unstructured":"M\u00fcller, P.: Modular Specification and Verification of Object-Oriented Programs. LNCS, vol.\u00a02262. Springer, Heidelberg (2002)"},{"issue":"1","key":"8_CR19","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Infinite Systems Security\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Trans. Infinite Systems Security"},{"key":"8_CR20","unstructured":"Schwoon, S.: Model-Checking Pushdown Systems. PhD thesis, Technische Universit\u00e4t M\u00fcnchen (2002)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Soleimanifard, S., Gurov, D., Huisman, M.: Procedure\u2013modular verification of control flow safety properties. In: Workshop on Formal Techniques for Java Programs (FTfJP 2010) (2010)","DOI":"10.1145\/1924520.1924525"},{"key":"8_CR22","unstructured":"Vall\u00e9e-Rai, R., Hendren, L., Sundaresan, V., Lam, P., Gagnon, E., Co, P.: Soot - a Java Optimization Framework. In: CASCON 1999, pp. 125\u2013135 (1999)"},{"key":"8_CR23","first-page":"14","volume-title":"Logic in Computer Science (LICS 1995)","author":"I. Walukiewicz","year":"1995","unstructured":"Walukiewicz, I.: Completeness of Kozen\u2019s axiomatisation of the propositional mu-calculus. In: Logic in Computer Science (LICS 1995), pp. 14\u201324. IEEE, Los Alamitos (1995)"}],"container-title":["Lecture Notes in Computer Science","Formal Verification of Object-Oriented Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18070-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T22:29:56Z","timestamp":1553380196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18070-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642180699","9783642180705"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18070-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}