{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:55:25Z","timestamp":1729637725796,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/dtis.2017.7930158","type":"proceedings-article","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T18:36:34Z","timestamp":1495132594000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Model checking of security properties: A case study on Human-Robot Interaction processes"],"prefix":"10.1109","author":[{"given":"Giuseppe Airo","family":"Farulla","sequence":"first","affiliation":[]},{"given":"Anna-Lena","family":"Lamprecht","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Module Configuration by Minimal Model Construction","year":"1993","author":"steffen","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-009-0091-6"},{"key":"ref12","article-title":"Model driven design of secure high assurance systems: an introduction to the open platform from the user perspective","author":"bobelmann","year":"2016","journal-title":"Proceedings of the International Conference on Security and Management (SAM) The Steering Committee of The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp)"},{"key":"ref13","article-title":"Model driven design of crypto primitives and processes","author":"di natale","year":"2016","journal-title":"Proceedings of the International Conference on Security and Management (SAM) The Steering Committee of The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp)"},{"journal-title":"Cinco A simplicity-driven approach to full generation of domain-specific graphical modeling tools","year":"2016","author":"naujokat","key":"ref14"},{"key":"ref15","first-page":"194","article-title":"IT Simply Works: Simplicity and Embedded Systems Design","author":"tiziana","year":"2011","journal-title":"IEEE 35th Annual ComputerSoftware and Applications Conference Workshops (COMPSACW) 2011"},{"key":"ref16","first-page":"847","article-title":"Hierarchical Service Definition","volume":"51","author":"steffen","year":"1997","journal-title":"Annual Review of Communications of the ACM"},{"key":"ref17","article-title":"ROS: an open-source robot operating system In: ICRA workshop on open source software","author":"quigley","year":"2009","journal-title":"IEEE Kobe Japan"},{"key":"ref18","first-page":"72","author":"steffen","year":"1995","journal-title":"The Fixpoint-Analysis Machine"},{"key":"ref19","first-page":"92","author":"steffen","year":"2006","journal-title":"Model-Driven Development with the JABC"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS.2016.7483810"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2297-5_10"},{"journal-title":"Model checking","year":"1999","author":"clarke","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DTIS.2017.7930157"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/b137241","volume":"3472","author":"broy","year":"2005","journal-title":"Model-Based Testing of Reactive Systems Advanced Lectures"},{"key":"ref7","first-page":"330","article-title":"Model-Checking-A Tutorial Introduction","author":"muller-olm","year":"1999","journal-title":"Proceedings of the 6th International Symposium on Static Analysis (SAS'99)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-288-6.ch001"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/5.52214","article-title":"The high-level synthesis of digital systems","volume":"78","author":"michael","year":"1990","journal-title":"Proceedings of the IEEE"},{"key":"ref1","article-title":"Model driven design of secure properties for vision-based applications: A case study","author":"farulla","year":"2016","journal-title":"Proceedings of the International Conference on Security and Management (SAM) The Steering Committee of The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/5397.5399"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.315"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0014354"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.299"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-012-0254-x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2793675"}],"event":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","start":{"date-parts":[[2017,4,4]]},"location":"Palma de Mallorca, Spain","end":{"date-parts":[[2017,4,6]]}},"container-title":["2017 12th International Conference on Design &amp; Technology of Integrated Systems In Nanoscale Era (DTIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7921855\/7929862\/07930158.pdf?arnumber=7930158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T16:44:38Z","timestamp":1569343478000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7930158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dtis.2017.7930158","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}