{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T20:06:38Z","timestamp":1774987598587,"version":"3.50.1"},"reference-count":40,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1080\/00207161003703205","type":"journal-article","created":{"date-parts":[[2010,12,17]],"date-time":"2010-12-17T13:31:22Z","timestamp":1292592682000},"page":"665-694","source":"Crossref","is-referenced-by-count":4,"title":["An abstract interpretation-based model for safety semantics"],"prefix":"10.1080","volume":"88","author":[{"given":"Isabella","family":"Mastroeni","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Giacobazzi","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","first-page":"1","volume-title":"Handbook of Logic in Computer Science","volume":"3","author":"Abramsky S.","year":"1994"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(85)90056-0"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/BF01782772"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(86)90132-8"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6494"},{"key":"CIT0006","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3233\/FI-2000-41301","volume":"41","author":"Baier C.","year":"2000","journal-title":"Fund. Inform."},{"key":"CIT0007","volume-title":"Lattice Theory","author":"Birkhoff G.","year":"1967","edition":"3"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Chang, E., Manna, Z. and Pnueli, A. Characterization of temporal property classes. Proceedings of the International Colloquium on Automata, Languages and Programming (ICALP \u201992). Edited by: Kuich, W. Vol. 623, pp.474\u2013486. Berlin: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/3-540-55719-9_97"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1145\/239912.239914"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00313-3"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Cousot, P. and Cousot, R. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. Proceedings of Conference Record of the 4th ACM Symposium on Principles of Programming Languages (POPL \u201977). pp.238\u2013252. New York: ACM Press.","DOI":"10.1145\/512950.512973"},{"key":"CIT0012","doi-asserted-by":"crossref","first-page":"43","DOI":"10.2140\/pjm.1979.82.43","volume":"82","author":"Cousot P.","year":"1979","journal-title":"Pacific J. Math."},{"key":"CIT0013","doi-asserted-by":"crossref","unstructured":"Cousot, P. and Cousot, R. Systematic design of program analysis frameworks. Proceedings of Conference Record of the 6th ACM Symposium on Principles of Programming Languages (POPL \u201979). pp.269\u2013282. New York: ACM Press.","DOI":"10.1145\/567752.567778"},{"key":"CIT0014","doi-asserted-by":"crossref","unstructured":"Cousot, P. and Cousot, R. Inductive definitions, semantics and abstract interpretation. Proceedings of Conference Record of the 19th ACM Symposium on Principles of Programming Languages (POPL \u201992). pp.83\u201394. New York: ACM Press.","DOI":"10.1145\/143165.143184"},{"key":"CIT0015","volume-title":"Mathematical Theory of Program Correctness","author":"de Bakker J.","year":"1980"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1145\/360933.360975"},{"key":"CIT0017","volume-title":"A Discipline of Programming","author":"Dijkstra E. W.","year":"1976"},{"key":"CIT0018","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1016\/S1385-7258(54)50072-7","volume":"16","author":"Dwinger P.","year":"1954","journal-title":"Indag. Math."},{"key":"CIT0019","unstructured":"Fil\u00e9, G. and Ranzato, F. Complementation of abstract domains made easy. Proceedings of the 1996 Joint International Conference and Symposium on Logic Programming (JICSLP \u201996). Edited by: Maher, M. J. pp.348\u2013362. Cambridge, MA: The MIT Press."},{"key":"CIT0020","doi-asserted-by":"crossref","unstructured":"Fong, P. W. Access control by tracking shallow execution history. Proceedings of the 2004 IEEE Symposium on Security and Privacy. pp.43\u201355. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/SECPRI.2004.1301314"},{"key":"CIT0021","doi-asserted-by":"crossref","unstructured":"Giacobazzi, R. and Ranzato, F. Refining and compressing abstract domains. Proceedings of the 24th International Colloquium on Automata, Languages and Programming (ICALP \u201997). Edited by: Goos, G., Hartmanis, J. and van Leeuwen, J. Vol. 1256, pp.771\u2013781. Berlin: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/3-540-63165-8_230"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/BF01236765"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1145\/333979.333989"},{"key":"CIT0024","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-67678-9","volume-title":"A Compendium of Continuous Lattices","author":"Gierz G.","year":"1980"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(93)90074-J"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1145\/1111596.1111601"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1145\/177492.177726"},{"key":"CIT0030","doi-asserted-by":"crossref","unstructured":"Ligatti, J., Bauer, L. and Walker, D. Enforcing non-safety security policies with program monitors. 10th European Symposium on Research in Computer Security (ESORICS). Edited by: di Vimercati, S. D.C., Syverson, P. F. and Gollmann, D. Vol. 3679, pp.355\u2013373. Berlin: Springer-Verlag. Lecture Notes in Computer Science","DOI":"10.1007\/11555827_21"},{"key":"CIT0031","first-page":"135","volume":"21","author":"Morgado J.","year":"1962","journal-title":"Port. Math."},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357178"},{"key":"CIT0033","unstructured":"Paun, D. O. April 1999. \u201cClosure under stuttering in temporal formulas\u201d. April, Toronto, Ontario: Dept. of Computer Science, University of Toronto. Master's thesis"},{"key":"CIT0034","volume-title":"A Structural Approach to Operational Semantics","author":"Plotkin G.","year":"1981"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"CIT0036","doi-asserted-by":"crossref","first-page":"209","DOI":"10.2140\/pjm.1974.54.209","volume":"54","author":"Shmuely Z.","year":"1974","journal-title":"Pacific J. Math."},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1007\/BF01211865"},{"key":"CIT0038","unstructured":"Sistla, A. P. On characterization of safety and liveness properties in temporal logic. Proceedings of the 4th ACM Symposium on Principles of Distributed Computing. Edited by: Malcolm, M. and Strong, R. New York: ACM Press."},{"key":"CIT0039","first-page":"641","volume-title":"Handbook of Logic in Computer Science (Vol. 1): Background: Mathematical Structures","volume":"1","author":"Smyth M. B.","year":"1992"},{"key":"CIT0040","volume":"116","author":"Thomas W.","year":"1986","journal-title":"Schriften Zur Informatik, Bericht"}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207161003703205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T22:52:20Z","timestamp":1740783140000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/00207161003703205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["10.1080\/00207161003703205"],"URL":"https:\/\/doi.org\/10.1080\/00207161003703205","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3]]}}}