{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:11:24Z","timestamp":1761610284179,"version":"build-2065373602"},"reference-count":9,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2003,9,1]],"date-time":"2003-09-01T00:00:00Z","timestamp":1062374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2003,9,1]],"date-time":"2003-09-01T00:00:00Z","timestamp":1062374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3619,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2003,9]]},"DOI":"10.1016\/s1571-0661(04)81030-2","type":"journal-article","created":{"date-parts":[[2004,9,29]],"date-time":"2004-09-29T12:47:47Z","timestamp":1096462067000},"page":"110-120","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Safety Mechanism Using Software Patterns"],"prefix":"10.1016","volume":"82","author":[{"given":"Kiyohito","family":"Itoh","sequence":"first","affiliation":[]},{"given":"Hiromi","family":"Kobayashi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)81030-2_NEWBIB1","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","article-title":"\u201cStatecharts: A visual formalism for complex systems\u201d","volume":"Vol. 8","author":"Harel","year":"1987","journal-title":"Science of Computer Programming"},{"key":"10.1016\/S1571-0661(04)81030-2_NEWBIB2","doi-asserted-by":"crossref","unstructured":"Bartussek W., and Parnas, D.L., \u201cUsing assertions about traces to write abstract specifications for software modules,\u201d Proc2nd Conference Euorpean Cooperation in Informatics on Information Systems Methodology, pp. 211\u2013236, 1978.","DOI":"10.1007\/3-540-08934-9_80"},{"year":"1995","series-title":"\u201cSafeware: SystemSafety and Computer,\u201d","author":"Leveson","key":"10.1016\/S1571-0661(04)81030-2_NEWBIB3"},{"year":"1995","series-title":"\u201cDesign patterns,\u201d","author":"Gamma","key":"10.1016\/S1571-0661(04)81030-2_NEWBIB4"},{"year":"1996","series-title":"\u201cPattern-oriented Software Architecture: A System of Patterns,\u201d","author":"Buschmann","key":"10.1016\/S1571-0661(04)81030-2_NEWBIB5"},{"year":"1998","series-title":"\u201cPatterns in Java: A Catalog of Reusable Design Patterns, Illustrated with UML Volume 1,\u201d","author":"Grand","key":"10.1016\/S1571-0661(04)81030-2_NEWBIB6"},{"issue":"No.3","key":"10.1016\/S1571-0661(04)81030-2_NEWBIB7","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1109\/TSE.1987.233170","article-title":"\u201cSafety analysis using petri nets\u201d","volume":"Vol. SE-13","author":"Leveson","year":"1987","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/S1571-0661(04)81030-2_NEWBIB8","series-title":"Real-time theory in practice","first-page":"45","article-title":"\u201cThe theory of timed automata\u201d","author":"Alur","year":"1992"},{"key":"10.1016\/S1571-0661(04)81030-2_NEWBIB9","unstructured":"Matsumoto S., \u201cVerification of railway interlocking specification using formal safety requirements,\u201d (in Japanese) Technical Report of IEICE, FTS99-69, pp. 29\u201336, 1999."}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104810302?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104810302?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:06:23Z","timestamp":1761609983000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104810302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,9]]},"references-count":9,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2003,9]]}},"alternative-id":["S1571066104810302"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)81030-2","relation":{},"ISSN":["1571-0661"],"issn-type":[{"type":"print","value":"1571-0661"}],"subject":[],"published":{"date-parts":[[2003,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A Safety Mechanism Using Software Patterns","name":"articletitle","label":"Article Title"},{"value":"Electronic Notes in Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1571-0661(04)81030-2","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2003 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}