{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:53:03Z","timestamp":1725742383481},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642396977"},{"type":"electronic","value":"9783642396984"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39698-4_18","type":"book-chapter","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T17:03:05Z","timestamp":1374685385000},"page":"285-303","source":"Crossref","is-referenced-by-count":4,"title":["Safety versus Security in the Quality Calculus"],"prefix":"10.1007","author":[{"given":"Hanne Riis","family":"Nielson","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/3-540-63383-9_92","volume-title":"Coordination Languages and Models","author":"R.M. Amadio","year":"1997","unstructured":"Amadio, R.M.: An asynchronous model of locality, failure and process mobility. In: Garlan, D., Le M\u00e9tayer, D. (eds.) COORDINATION 1997. LNCS, vol.\u00a01282, pp. 374\u2013391. Springer, Heidelberg (1997)"},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/S1571-0661(05)82502-2","volume":"39","author":"M. Berger","year":"2000","unstructured":"Berger, M., Honda, K.: The two-phase commitment protocol in an extended pi-calculus. Electr. Notes Theor. Comput. Sci.\u00a039(1), 21\u201346 (2000)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-17714-9_5","volume-title":"Information Systems Security","author":"A. Birgisson","year":"2010","unstructured":"Birgisson, A., Russo, A., Sabelfeld, A.: Unifying facets of information integrity. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol.\u00a06503, pp. 48\u201365. Springer, Heidelberg (2010)"},{"issue":"9","key":"18_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1995376.1995394","volume":"54","author":"L.M. Moura de","year":"2011","unstructured":"de Moura, L.M., Bj\u00f8rner, N.: Satisfiability modulo theories: introduction and applications. Commun. ACM\u00a054(9), 69\u201377 (2011)","journal-title":"Commun. ACM"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1007\/11523468_99","volume-title":"Automata, Languages and Programming","author":"R. Nicola De","year":"2005","unstructured":"De Nicola, R., Gorla, D., Pugliese, R.: Basic observables for a calculus for global computing. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol.\u00a03580, pp. 1226\u20131238. Springer, Heidelberg (2005)"},{"issue":"1-2","key":"18_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jlap.2007.03.003","volume":"73","author":"A. Francalanza","year":"2007","unstructured":"Francalanza, A., Hennessy, M.: A Theory for Observational Fault Tolerance. J. Log. Algebr. Program.\u00a073(1-2), 22\u201350 (2007)","journal-title":"J. Log. Algebr. Program."},{"key":"18_CR7","unstructured":"Gollmann, D.: Computer Security, 3rd edn. Wiley (2011)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Lee, E.A.: Cyber physical systems: Design challenges. In: 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), pp. 363\u2013369. IEEE Computer Society (2008)","DOI":"10.1109\/ISORC.2008.25"},{"issue":"8","key":"18_CR9","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1536616.1536637","volume":"52","author":"S. Malik","year":"2009","unstructured":"Malik, S., Zhang, L.: Boolean satisfiability from theoretical hardness to practical success. Commun. ACM\u00a052(8), 76\u201382 (2009)","journal-title":"Commun. ACM"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Mantel, H., Sands, D., Sudbrock, H.: Assumptions and guarantees for compositional noninterference. In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, pp. 218\u2013232. IEEE Computer Society (2011)","DOI":"10.1109\/CSF.2011.22"},{"key":"18_CR11","unstructured":"Milner, R.: Communicating and Mobile Systems: the Pi-Calculus. Cambridge University Press (1999)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-35861-6_12","volume-title":"Formal Aspects of Component Software","author":"H.R. Nielson","year":"2013","unstructured":"Nielson, H.R., Nielson, F., Vigo, R.: A calculus for quality. In: P\u0103s\u0103reanu, C.S., Sala\u00fcn, G. (eds.) FACS 2012. LNCS, vol.\u00a07684, pp. 188\u2013204. Springer, Heidelberg (2013)"},{"key":"18_CR13","unstructured":"Parrow, J., Victor, B.: The fusion calculus: Expressiveness and symmetry in mobile processes. In: Proc. IEEE Symp. on Logic in Computer Science, pp. 176\u2013185 (1998)"},{"issue":"1-2","key":"18_CR14","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1016\/S0304-3975(00)00326-1","volume":"266","author":"J. Riely","year":"2001","unstructured":"Riely, J., Hennessy, M.: Distributed processes and location failures. Theor. Comput. Sci.\u00a0266(1-2), 693\u2013735 (2001)","journal-title":"Theor. Comput. Sci."},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-540-37621-7_9","volume-title":"Software Security - Theories and Systems","author":"A. Sabelfeld","year":"2004","unstructured":"Sabelfeld, A., Myers, A.C.: A model for delimited information release. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, vol.\u00a03233, pp. 174\u2013191. Springer, Heidelberg (2004)"},{"issue":"2\/3","key":"18_CR16","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D.M. Volpano","year":"1996","unstructured":"Volpano, D.M., Irvine, C.E., Smith, G.: A sound type system for secure flow analysis. Journal of Computer Security\u00a04(2\/3), 167\u2013188 (1996)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Theories of Programming and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39698-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T03:25:46Z","timestamp":1557977146000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39698-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642396977","9783642396984"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39698-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}