{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:32:51Z","timestamp":1772299971787,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:00:00Z","timestamp":1683849600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T00:00:00Z","timestamp":1683849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Autom Reasoning"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s10817-023-09666-2","type":"journal-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T16:02:11Z","timestamp":1683907331000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Automatically Verified Prototype of the Android Permissions System"],"prefix":"10.1007","volume":"67","author":[{"given":"Maximiliano","family":"Cristi\u00e1","sequence":"first","affiliation":[]},{"given":"Guido","family":"De Luca","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Luna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,12]]},"reference":[{"key":"9666_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511624162","volume-title":"The B-Book: Assigning Programs to Meanings","author":"J-R Abrial","year":"1996","unstructured":"Abrial, J.-R.: The B-Book: Assigning Programs to Meanings. Cambridge University Press, New York (1996)"},{"key":"9666_CR2","unstructured":"Android Developers: Application Fundamentals. http:\/\/developer.android.com\/guide\/components\/fundamentals.html. Accessed Jan 2023"},{"issue":"5","key":"9666_CR3","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s00165-017-0445-z","volume":"30","author":"H Bagheri","year":"2018","unstructured":"Bagheri, H., Kang, E., Malek, S., Jackson, D.: A formal approach for detection of security flaws in the android permission system. Formal Aspects Comput. 30(5), 525\u2013544 (2018). https:\/\/doi.org\/10.1007\/s00165-017-0445-z","journal-title":"Formal Aspects Comput."},{"key":"9666_CR4","unstructured":"Bell, D.E., LaPadula, L.: Secure computer systems: mathematical foundations. MTR 2547, The MITRE Corporation (May 1973)"},{"key":"9666_CR5","unstructured":"Bell, D.E., LaPadula, L.: Secure computer systems: mathematical model. ESD-TR 73-278, The MITRE Corporation (November 1973)"},{"key":"9666_CR6","doi-asserted-by":"publisher","unstructured":"Bertot, Y., Cast\u00e9ran, P.: Interactive Theorem Proving and Program Development\u2014Coq\u2019Art: The Calculus of Inductive Constructions. Texts in Theoretical Computer Science. An EATCS Series. Springer, Berlin (2004). https:\/\/doi.org\/10.1007\/978-3-662-07964-5","DOI":"10.1007\/978-3-662-07964-5"},{"key":"9666_CR7","doi-asserted-by":"publisher","unstructured":"Betarte, G., Campo, J.D., Luna, C.D., Romano, A.: Verifying Android\u2019s permission model. In: Leucker, M., Rueda, C., Valencia, F.D. (eds.) Theoretical aspects of computing\u2014ICTAC 2015\u201412th international colloquium Cali, Colombia, October 29\u201331, 2015. In: Proceedings. Lecture Notes in Computer Science, vol. 9399, pp. 485\u2013504. Springer, Berlin (2015). https:\/\/doi.org\/10.1007\/978-3-319-25150-9_28","DOI":"10.1007\/978-3-319-25150-9_28"},{"issue":"1","key":"9666_CR8","doi-asserted-by":"publisher","first-page":"27","DOI":"10.7561\/SACS.2016.1.27","volume":"26","author":"G Betarte","year":"2016","unstructured":"Betarte, G., Campo, J.D., Luna, C., Romano, A.: Formal analysis of Android\u2019s permission-based security model. Sci. Ann. Comput. Sci. 26(1), 27\u201368 (2016). https:\/\/doi.org\/10.7561\/SACS.2016.1.27","journal-title":"Sci. Ann. Comput. Sci."},{"key":"9666_CR9","doi-asserted-by":"publisher","unstructured":"Betarte, G., Campo, J.D., Gorostiaga, F., Luna, C.: A certified reference validation mechanism for the permission model of Android. In: Fioravanti, F., Gallagher, J.P. (eds.) Logic-Based Program Synthesis and Transformation\u201427th International Symposium, LOPSTR 2017, Namur, Belgium, October 10-12, 2017, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10855, pp. 271\u2013288. Springer, Berlin (2017). https:\/\/doi.org\/10.1007\/978-3-319-94460-9_16","DOI":"10.1007\/978-3-319-94460-9_16"},{"issue":"1","key":"9666_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10817-013-9278-5","volume":"51","author":"JC Blanchette","year":"2013","unstructured":"Blanchette, J.C., B\u00f6hme, S., Paulson, L.C.: Extending sledgehammer with SMT solvers. J. Autom. Reason. 51(1), 109\u2013128 (2013). https:\/\/doi.org\/10.1007\/s10817-013-9278-5","journal-title":"J. Autom. Reason."},{"key":"9666_CR11","doi-asserted-by":"publisher","unstructured":"Boniol, F., Wiels, V.: The landing gear system case study. In: Boniol, F., Wiels, V., Ameur, Y.A., Schewe, K. (eds.) ABZ 2014: The Landing Gear Case Study\u2014Case Study Track, Held at the 4th International Conference on Abstract State Machines, Alloy, B, TLA, VDM, and Z, Toulouse, France, June 2\u20136, 2014. Proceedings. Communications in Computer and Information Science, vol. 433, pp. 1\u201318. Springer, Berlin (2014). https:\/\/doi.org\/10.1007\/978-3-319-07512-9_1","DOI":"10.1007\/978-3-319-07512-9_1"},{"key":"9666_CR12","volume-title":"Computable Set Theory","author":"D Cantone","year":"1989","unstructured":"Cantone, D., Ferro, A., Omodeo, E.: Computable Set Theory. Clarendon Press, Oxford (1989)"},{"key":"9666_CR13","doi-asserted-by":"publisher","unstructured":"Cantone, D., Omodeo, E.G., Policriti, A.: Set theory for computing - from decision procedures to declarative programming with sets. In: Monographs in Computer Science. Springer, Berlin (2001). https:\/\/doi.org\/10.1007\/978-1-4757-3452-2","DOI":"10.1007\/978-1-4757-3452-2"},{"key":"9666_CR14","doi-asserted-by":"publisher","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.A.: Analyzing inter-application communication in android. In: Agrawala, A.K., Corner, M.D., Wetherall, D. (eds.) Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys 2011), Bethesda, MD, USA, June 28 - July 01, 2011, pp. 239\u2013252. ACM (2011). https:\/\/doi.org\/10.1145\/1999995.2000018","DOI":"10.1145\/1999995.2000018"},{"key":"9666_CR15","unstructured":"Chlipala, A.: Certified Programming with Dependent Types\u2014A Pragmatic Introduction to the Coq Proof Assistant. MIT Press. http:\/\/mitpress.mit.edu\/books\/certified-programming-dependent-types"},{"key":"9666_CR16","unstructured":"Coleman, J., Jones, C., Oliver, I., Romanovsky, A., E.Troubitsyna: RODIN (Rigorous open Development Environment for Complex Systems). In: Fifth European Dependable Computing Conference: EDCC-5 Supplementary Volume, pp. 23\u201326 (2005)"},{"key":"9666_CR17","unstructured":"Common Criteria Recognition Arrangement: common criteria for information technology security evaluation, part 1: introduction and general model, version 3.1. release 5. Technical report (2017). https:\/\/www.commoncriteriaportal.org\/files\/ccfiles\/CCPART1V3.1R5.pdf"},{"issue":"2\/3","key":"9666_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0890-5401(88)90005-3","volume":"76","author":"T Coquand","year":"1988","unstructured":"Coquand, T., Huet, G.P.: The calculus of constructions. Inf. Comput. 76(2\/3), 95\u2013120 (1988). https:\/\/doi.org\/10.1016\/0890-5401(88)90005-3","journal-title":"Inf. Comput."},{"key":"9666_CR19","doi-asserted-by":"publisher","unstructured":"Cristi\u00e1, M., Rossi, G.: A set solver for finite set relation algebra. In: Desharnais, J., Guttmann, W., Joosten, S. (eds.) Relational and Algebraic Methods in Computer Science\u201417th International Conference, RAMiCS 2018, Groningen, The Netherlands, October 29\u2013November 1, 2018. Proceedings of Lecture Notes in Computer Science, vol. 11194, pp. 333\u2013349. Springer, Berlin (2018). https:\/\/doi.org\/10.1007\/978-3-030-02149-8_20","DOI":"10.1007\/978-3-030-02149-8_20"},{"issue":"2","key":"9666_CR20","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s10817-019-09520-4","volume":"64","author":"M Cristi\u00e1","year":"2020","unstructured":"Cristi\u00e1, M., Rossi, G.: Solving quantifier-free first-order constraints over finite sets and binary relations. J. Autom. Reason. 64(2), 295\u2013330 (2020). https:\/\/doi.org\/10.1007\/s10817-019-09520-4","journal-title":"J. Autom. Reason."},{"key":"9666_CR21","doi-asserted-by":"crossref","unstructured":"Cristi\u00e1, M., Rossi, G.: An automatically verified prototype of a landing gear system (2021). CoRR arXiv:2112.15147","DOI":"10.21203\/rs.3.rs-2088594\/v1"},{"key":"9666_CR22","unstructured":"Cristi\u00e1, M., Rossi, G.: A decision procedure for a theory of finite sets with finite integer intervals. CoRR abs\/2105.03005 (2021)"},{"key":"9666_CR23","doi-asserted-by":"crossref","unstructured":"Cristi\u00e1, M., Rossi, G.: Integrating cardinality constraints into constraint logic programming with sets. Theory Pract Logic Program 1\u201333 (2021)","DOI":"10.1017\/S1471068421000521"},{"issue":"6","key":"9666_CR24","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/s10817-021-09589-w","volume":"65","author":"M Cristi\u00e1","year":"2021","unstructured":"Cristi\u00e1, M., Rossi, G.: Automated reasoning with restricted intensional sets. J. Autom. Reason. 65(6), 809\u2013890 (2021). https:\/\/doi.org\/10.1007\/s10817-021-09589-w","journal-title":"J. Autom. Reason."},{"issue":"4","key":"9666_CR25","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s10817-020-09577-6","volume":"65","author":"M Cristi\u00e1","year":"2021","unstructured":"Cristi\u00e1, M., Rossi, G.: Automated proof of Bell-LaPadula security properties. J. Autom. Reason. 65(4), 463\u2013478 (2021). https:\/\/doi.org\/10.1007\/s10817-020-09577-6","journal-title":"J. Autom. Reason."},{"issue":"8","key":"9666_CR26","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1007\/s10817-021-09602-2","volume":"65","author":"M Cristi\u00e1","year":"2021","unstructured":"Cristi\u00e1, M., Rossi, G.: An automatically verified prototype of the Tokeneer ID station specification. J. Autom. Reason. 65(8), 1125\u20131151 (2021). https:\/\/doi.org\/10.1007\/s10817-021-09602-2","journal-title":"J. Autom. Reason."},{"key":"9666_CR27","doi-asserted-by":"publisher","unstructured":"Cristi\u00e1, M., Rossi, G.: A set-theoretic decision procedure for quantifier-free, decidable languages extended with restricted quantifiers. CoRR abs\/2208.03518 (2022). https:\/\/doi.org\/10.48550\/arXiv.2208.03518. Under consideration in Journal of Automated Reasoning","DOI":"10.48550\/arXiv.2208.03518"},{"key":"9666_CR28","doi-asserted-by":"crossref","unstructured":"Cristi\u00e1, M., Rossi, G., Frydman, C.S.: \n$$\\{log\\}$$ as a test case generator for the Test Template Framework. In: Hierons, R.M., Merayo, M.G., Bravetti, M. (eds.) SEFM. Lecture Notes in Computer Science, vol. 8137, pp. 229\u2013243. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-40561-7_16"},{"issue":"1\u20134","key":"9666_CR29","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s10817-018-9458-4","volume":"61","author":"L Czajka","year":"2018","unstructured":"Czajka, L., Kaliszyk, C.: Hammer for Coq: automation for dependent type theory. J. Autom. Reason. 61(1\u20134), 423\u2013453 (2018). https:\/\/doi.org\/10.1007\/s10817-018-9458-4","journal-title":"J. Autom. Reason."},{"key":"9666_CR30","doi-asserted-by":"publisher","unstructured":"De Luca, G., Luna, C.: Towards a certified reference monitor of the Android 10 permission system. In: de\u2019Liguoro, U., Berardi, S., Altenkirch, T. (eds.) 26th International Conference on Types for Proofs and Programs, TYPES 2020, March 2\u20135, 2020, University of Turin, Italy. LIPIcs, vol. 188, pp. 3\u20131318. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2020). https:\/\/doi.org\/10.4230\/LIPIcs.TYPES.2020.3","DOI":"10.4230\/LIPIcs.TYPES.2020.3"},{"issue":"5","key":"9666_CR31","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1145\/365151.365169","volume":"22","author":"A Dovier","year":"2000","unstructured":"Dovier, A., Piazza, C., Pontelli, E., Rossi, G.: Sets and constraint logic programming. ACM Trans. Program. Lang. Syst. 22(5), 861\u2013931 (2000)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"8","key":"9666_CR32","doi-asserted-by":"publisher","first-page":"1839","DOI":"10.1007\/s00607-022-01069-2","volume":"104","author":"MA El-Zawawy","year":"2022","unstructured":"El-Zawawy, M.A., Faruki, P., Conti, M.: Formal model for inter-component communication and its security in android. Computing 104(8), 1839\u20131865 (2022). https:\/\/doi.org\/10.1007\/s00607-022-01069-2","journal-title":"Computing"},{"key":"9666_CR33","doi-asserted-by":"publisher","unstructured":"Fragkaki, E., Bauer, L., Jia, L., Swasey, D.: Modeling and enhancing android\u2019s permission system. In: Foresti, S., Yung, M., Martinelli, F. (eds.) Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10\u201312, 2012. Proceedings. Lecture Notes in Computer Science, vol. 7459, pp. 1\u201318. Springer, Berlin (2012). https:\/\/doi.org\/10.1007\/978-3-642-33167-1_1","DOI":"10.1007\/978-3-642-33167-1_1"},{"key":"9666_CR34","doi-asserted-by":"publisher","unstructured":"Hawblitzel, C., Howell, J., Kapritsos, M., Lorch, J.R., Parno, B., Roberts, M.L., Setty, S.T.V., Zill, B.: Ironfleet: proving practical distributed systems correct. In: Miller, E.L., Hand, S. (eds.) Proceedings of the 25th Symposium on Operating Systems Principles, SOSP 2015, Monterey, CA, USA, October 4-7, 2015, pp. 1\u201317. ACM (2015). https:\/\/doi.org\/10.1145\/2815400.2815428","DOI":"10.1145\/2815400.2815428"},{"key":"9666_CR35","unstructured":"International Data Corporation: Smartphone market share. Technical report, International Data Corporation (IDC) (2022)"},{"key":"9666_CR36","doi-asserted-by":"publisher","unstructured":"Jackson, D.: Alloy: A logical modelling language. In: Bert, D., Bowen, J.P., King, S., Wald\u00e9n, M.A. (eds.) ZB 2003: Formal Specification and Development in Z and B, Third International Conference of B and Z Users, Turku, Finland, June 4-6, 2003, Proceedings. Lecture Notes in Computer Science, vol. 2651, p. 1. Springer, Berlin (2003). https:\/\/doi.org\/10.1007\/3-540-44880-2_1","DOI":"10.1007\/3-540-44880-2_1"},{"key":"9666_CR37","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1186\/s13673-018-0144-7","volume":"8","author":"W Khan","year":"2018","unstructured":"Khan, W., Ullah, H., Ahmad, A., Sultan, K., Alzahrani, A.J., Khan, S.D., Alhumaid, M., Abdulaziz, S.: Crashsafe: a formal model for proving crash-safety of android applications. Hum. Centric Comput. Inf. Sci. 8, 21 (2018). https:\/\/doi.org\/10.1186\/s13673-018-0144-7","journal-title":"Hum. Centric Comput. Inf. Sci."},{"key":"9666_CR38","doi-asserted-by":"publisher","unstructured":"Leino, K.R.M.: Dafny: An automatic program verifier for functional correctness. In: Clarke, E.M., Voronkov, A. (eds.) Logic for Programming, Artificial Intelligence, and Reasoning\u201416th International Conference, LPAR-16, Dakar, Senegal, April 25\u2013May 1, 2010, Revised Selected Papers. Lecture Notes in Computer Science, vol. 6355, pp. 348\u2013370. Springer, (2010). https:\/\/doi.org\/10.1007\/978-3-642-17511-4_20. https:\/\/doi.org\/10.1007\/978-3-642-17511-4_20","DOI":"10.1007\/978-3-642-17511-4_20"},{"key":"9666_CR39","unstructured":"Letouzey, P.: Programmation fonctionnelle certifi\u00e9e \u2013 l\u2019extraction de programmes dans l\u2019assistant Coq. PhD thesis, Universit\u00e9 Paris-Sud (July 2004)"},{"key":"9666_CR40","unstructured":"Luca, G.D., Luna, C.: Formal verification of the security model of Android 10: Coq code. https:\/\/github.com\/g-deluca\/android-coq-model. Accessed Jan 2023"},{"issue":"2","key":"9666_CR41","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10009-015-0391-0","volume":"19","author":"A Mammar","year":"2017","unstructured":"Mammar, A., Laleau, R.: Modeling a landing gear system in Event-B. Int. J. Softw. Tools Technol. Transf. 19(2), 167\u2013186 (2017). https:\/\/doi.org\/10.1007\/s10009-015-0391-0","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"9666_CR42","doi-asserted-by":"publisher","unstructured":"Micinski, K.K., Fetter-Degges, J., Jeon, J., Foster, J.S., Clarkson, M.R.: Checking interaction-based declassification policies for android using symbolic execution. In: Pernul, G., Ryan, P.Y.A., Weippl, E.R. (eds.) Computer Security\u2014ESORICS 2015\u201420th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9327, pp. 520\u2013538. Springer, Berlin (2015). https:\/\/doi.org\/10.1007\/978-3-319-24177-7_26","DOI":"10.1007\/978-3-319-24177-7_26"},{"key":"9666_CR43","unstructured":"Open Handset Alliance: Android Project. https:\/\/source.android.com. Accessed Jan 2023"},{"key":"9666_CR44","doi-asserted-by":"publisher","unstructured":"Paulin-Mohring, C.: Inductive definitions in the system coq - rules and properties. In: Bezem, M., Groote, J.F. (eds.) Typed Lambda Calculi and Applications, International Conference on Typed Lambda Calculi and Applications, TLCA \u201993, Utrecht, The Netherlands, March 16-18, 1993, Proceedings. Lecture Notes in Computer Science, vol. 664, pp. 328\u2013345. Springer, Berlin (1993). https:\/\/doi.org\/10.1007\/BFb0037116","DOI":"10.1007\/BFb0037116"},{"key":"9666_CR45","unstructured":"Rossi, G.: \n$$\\{log\\}$$. Accessed 2022"},{"key":"9666_CR46","doi-asserted-by":"publisher","unstructured":"Sadeghi, A., Jabbarvand, R., Ghorbani, N., Bagheri, H., Malek, S.: A temporal permission analysis and enforcement framework for android. In: Chaudron, M., Crnkovic, I., Chechik, M., Harman, M. (eds.) Proceedings of the 40th International Conference on Software Engineering, ICSE 2018, Gothenburg, Sweden, May 27\u2013June 03, 2018, pp. 846\u2013857. ACM (2018). https:\/\/doi.org\/10.1145\/3180155.3180172","DOI":"10.1145\/3180155.3180172"},{"key":"9666_CR47","doi-asserted-by":"publisher","unstructured":"Sbirlea, D., Burke, M.G., Guarnieri, S., Pistoia, M., Sarkar, V.: Automatic detection of inter-application permission leaks in Android applications. IBM J. Res. Dev.57(6). https:\/\/doi.org\/10.1147\/JRD.2013.2284403","DOI":"10.1147\/JRD.2013.2284403"},{"key":"9666_CR48","doi-asserted-by":"publisher","unstructured":"Schwartz, J.T., Dewar, R.B.K., Dubinsky, E., Schonberg, E.: Programming with sets\u2014an introduction to SETL. In: Texts and Monographs in Computer Science. Springer, New York (1986). https:\/\/doi.org\/10.1007\/978-1-4613-9575-1","DOI":"10.1007\/978-1-4613-9575-1"},{"key":"9666_CR49","doi-asserted-by":"publisher","unstructured":"Shin, W., Kiyomoto, S., Fukushima, K., Tanaka, T.: A formal model to analyze the permission authorization and enforcement in the Android framework. In: Elmagarmid, A.K., Agrawal, D. (eds.) Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom\/IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, Minnesota, USA, August 20-22, 2010, pp. 944\u2013951. IEEE Computer Society (2010). https:\/\/doi.org\/10.1109\/SocialCom.2010.140","DOI":"10.1109\/SocialCom.2010.140"},{"key":"9666_CR50","unstructured":"Spivey, J.M.: The Z Notation: A Reference Manual. Prentice Hall International (UK) Ltd., Hertfordshire (1992)"},{"issue":"4","key":"9666_CR51","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1007\/s10796-020-10066-9","volume":"23","author":"S Talegaon","year":"2021","unstructured":"Talegaon, S., Krishnan, R.: A formal specification of access control in android with URI permissions. Inf. Syst. Front. 23(4), 849\u2013866 (2021). https:\/\/doi.org\/10.1007\/s10796-020-10066-9","journal-title":"Inf. Syst. Front."},{"key":"9666_CR52","unstructured":"The Coq Team: The Coq Proof Assistant Reference Manual\u2014Version V8.12.0. LogiCal Project, Palaiseau, France (2020). LogiCal Project. http:\/\/coq.inria.fr"}],"container-title":["Journal of Automated Reasoning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10817-023-09666-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10817-023-09666-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10817-023-09666-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T07:04:43Z","timestamp":1687331083000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10817-023-09666-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,12]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["9666"],"URL":"https:\/\/doi.org\/10.1007\/s10817-023-09666-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2088594\/v1","asserted-by":"object"}]},"ISSN":["0168-7433","1573-0670"],"issn-type":[{"value":"0168-7433","type":"print"},{"value":"1573-0670","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,12]]},"assertion":[{"value":"21 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"17"}}