{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T19:50:05Z","timestamp":1725652205537},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540539117"},{"type":"electronic","value":"9783642765629"}],"license":[{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1987]]},"DOI":"10.1007\/978-3-642-76562-9_14","type":"book-chapter","created":{"date-parts":[[2012,1,16]],"date-time":"2012-01-16T04:47:41Z","timestamp":1326689261000},"page":"227-242","source":"Crossref","is-referenced-by-count":0,"title":["Werkzeuggest\u00fctzter Nachweis von Verl\u00e4\u00dflichkeitseigenschaften"],"prefix":"10.1007","author":[{"given":"Bernhard","family":"Hohlfeld","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","volume-title":"Secure Computer System: Unified Exposition and Multics Interpretation","author":"DE Bell","year":"1975","unstructured":"Bell, D.E. and LaPadula, L.J.: Secure Computer System: Unified Exposition and Multics Interpretation, ESD-TR-75\u2013306, The MITRE Corporation, 1975."},{"key":"14_CR2","series-title":"ACM Computing Surveys","volume-title":"Verifying Security","author":"MH Cheheyl","year":"1981","unstructured":"Cheheyl, M.H. et al: Verifying Security, ACM Computing Surveys vol 13 no 3, 1981."},{"key":"14_CR3","volume-title":"Languages for Parallel Architectures: Design, Semantics and Implementation Models","author":"W Damm","year":"1989","unstructured":"Damm, W. and D\u00f6hmen, G.: AADL: A Net-Based Specification Method for Computer Architecture Design, in: de Bakker, J.W. (ed): Languages for Parallel Architectures: Design, Semantics and Implementation Models, Wiley, 1989."},{"key":"14_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-12695-3","volume-title":"DIANA An Intermediate Language for Ada","author":"G Goos","year":"1983","unstructured":"Goos, G. et al: DIANA An Intermediate Language for Ada, LNCS 161, Springer, Berlin 1983."},{"key":"14_CR5","series-title":"Information Procesing","volume-title":"An Overview of AFFIRM: A Specification and Verification System","author":"SL Gerhart","year":"1980","unstructured":"Gerhart, S.L. et al: An Overview of AFFIRM: A Specification and Verification System, Information Procesing 80, North Holland, 1980."},{"key":"14_CR6","series-title":"Technical Report","volume-title":"Revised Report on GYPSY 2.1 (Draft)","author":"DI Good","year":"1985","unstructured":"Good, D.I.: Revised Report on GYPSY 2.1 (Draft), Technical Report, University of Texas at Austin 1985."},{"key":"14_CR7","volume-title":"UNICOM: A Refined Completion Based Inductive Theorem Prover, system abstract","author":"B Gramlich","year":"1990","unstructured":"Gramlich, B.: UNICOM: A Refined Completion Based Inductive Theorem Prover, system abstract, Proc. of 10th Int. Conf. on Automated Deduction, Kaiserslautern, 1990, to appear."},{"key":"14_CR8","volume-title":"PAS QUALE - Sprachbeschreibung, Technischer Bericht Nr. 12.020\/89","author":"B Hohlfeld","year":"1989","unstructured":"Hohlfeld, B., Jonsson, B., Kley, A.: PAS QUALE - Sprachbeschreibung, Technischer Bericht Nr. 12.020\/89, Daimler-Benz AG, Forschungsinstitut Ulm, 1989."},{"key":"14_CR9","volume-title":"An Axiomatic Definition of the Programming Language PASCAL","author":"CAR Hoare","year":"1973","unstructured":"Hoare, C.A.R. and Wirth, N.: An Axiomatic Definition of the Programming Language PASCAL, acta informatica 2, 1973."},{"key":"14_CR10","unstructured":"IT-Sicherheitskriterien, Kriterien f\u00fcr die Bewertung der Sicherheit von Systemen der Informationstechnik (IT), Bundesanzeiger, K\u00f6ln 1989."},{"volume-title":"Sichere Software, Formale Spezifikation und Verifikation vertrauensw\u00fcrdiger Systeme","year":"1990","key":"14_CR11","unstructured":"Kersten, H.(ed): Sichere Software, Formale Spezifikation und Verifikation vertrauensw\u00fcrdiger Systeme, H\u00fcthig, Heidelberg 1990."},{"key":"14_CR12","volume-title":"Reasoning about Systems of Linear Inequalities","author":"T K\u00e4ufl","year":"1988","unstructured":"K\u00e4ufl, Th.: Reasoning about Systems of Linear Inequalities, 9th International Conference on Automated Deduction, Lecture Notes on Computer Science, Berlin, Heidelberg, New York: 1988, Springer."},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","volume-title":"Recent Trends in Data Type Specification","author":"T Lehmann","year":"1988","unstructured":"Lehmann, T. and Loeckx, J.: The specification language of OBSCURE, in Sannella, D. and Tarlecki, A.(eds.): Recent Trends in Data Type Specification, Lecture Notes in Computer Science 332, Springer 1988."}],"container-title":["Informatik-Fachberichte","VIS \u201991 Verl\u00e4\u00dfliche Informationssysteme"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-76562-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T05:09:53Z","timestamp":1557896993000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-76562-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987]]},"ISBN":["9783540539117","9783642765629"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-76562-9_14","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1987]]}}}