{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T19:22:27Z","timestamp":1725650547433},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540571926"},{"type":"electronic","value":"9783642784866"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/978-3-642-78486-6_60","type":"book-chapter","created":{"date-parts":[[2012,1,8]],"date-time":"2012-01-08T17:17:00Z","timestamp":1326043020000},"page":"354-364","source":"Crossref","is-referenced-by-count":0,"title":["Formale Spezifikation generischer ITSEC-Funktionalit\u00e4tsklassen"],"prefix":"10.1007","author":[{"given":"Jan","family":"Peleska","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","volume-title":"DST-fuzz, An Introduction, Deutsche System-Technik GmbH","author":"Z Using","year":"1993","unstructured":"Using Z and DST-fuzz, An Introduction, Deutsche System-Technik GmbH, Kiel, Februar 1993"},{"key":"60_CR2","unstructured":"Communicating Sequential Processes. Prentice-Hall (1985)."},{"key":"60_CR3","unstructured":"HP-UX System Security, HP 9000 Computers, Hewlett Packard"},{"key":"60_CR4","unstructured":"Kriterien f\u00fcr die Bewertung der Sicherheit von Systemen der Informationstechnik (ITSEC), Vorl\u00e4ufige Form der harmonisierten Kriterien, Juni 1991, Amt f\u00fcr Ver\u00f6ffentlichungen der Europ\u00e4ischen Gemeinschaft."},{"key":"60_CR5","series-title":"Distributed Computing","first-page":"95","volume-title":"Design and verification of fault tolerant systems with CSP","author":"J Peleska","year":"1991","unstructured":"Peleska, J.: Design and verification of fault tolerant systems with CSP, Distributed Computing 5 (1991), pp- 95\u2013106."},{"key":"60_CR6","unstructured":"Peleska, J.: CSP, Formal Software-Engineering and the Development of Fault-Tolerant Systems. Erscheint in Vytopil, J.:FormaI Techniques in Real-Time and Fault Tolerant Systems. Kluwer Academic Publishers (1993)."},{"key":"60_CR7","volume-title":"Vorbereitung, DST Deutsche System-Technik","author":"J Peleska","year":"1993","unstructured":"Peleska, J.: Modelling ITSEC Functionality Classes With Z. in Vorbereitung, DST Deutsche System-Technik (1993)."},{"key":"60_CR8","volume-title":"The Z Notation: A Reference Manuel","author":"JM Spivey","year":"1989","unstructured":"Spivey, J.M.: The Z Notation: A Reference Manuel, Prentice-Hall International, 1989."},{"key":"60_CR9","volume-title":"Constructive Methods for IT-Security \u2014 the necessary Completion of \u201cformal\u201d Approaches. E.I.S.S. Report 12\/92","author":"H Strack","year":"1992","unstructured":"Strack, H.: Constructive Methods for IT-Security \u2014 the necessary Completion of \u201cformal\u201d Approaches. E.I.S.S. Report 12\/92, Universitaet Karlsruhe (1992)."},{"key":"60_CR10","volume-title":"Software Development with Z","author":"JB Wordsworth","year":"1992","unstructured":"Wordsworth J.B.: Software Development with Z. Addison-Wesley, Wokingham (U.K.) (1992)."}],"container-title":["Informatik aktuell","Informatik \u2014 Wirtschaft \u2014 Gesellschaft"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-78486-6_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T12:59:36Z","timestamp":1620305976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-78486-6_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540571926","9783642784866"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-78486-6_60","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[1993]]}}}