{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:53:16Z","timestamp":1730227996240,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/icacs.2018.8333496","type":"proceedings-article","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T17:04:13Z","timestamp":1523293453000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Checking JML-encoded finite state machine properties"],"prefix":"10.1109","author":[{"given":"Ijaz","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Nestor","family":"Catano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"175","article-title":"Verifying atomicity specifications for concurrent object-oriented software using model-checking","author":"hatcliff","year":"2003","journal-title":"Proc Int Conf Verification Model Checking Abstract Interpretation"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35691-4_47"},{"key":"ref12","first-page":"175","article-title":"Implementing a formally verifiable security protocol in java card","author":"hubbers","year":"2003","journal-title":"Proceedings of the 1st International Conference on Security in Pervasive Computing LNCS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1596486.1596490"},{"key":"ref14","first-page":"1","article-title":"Preliminary Design of JML: A Behavioral Interface Specification Language for Java","volume":"31","author":"leavens","year":"2006","journal-title":"ACM Special Interest Grupo on Software Engineering"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/2.161279"},{"journal-title":"The plural tool","year":"0","key":"ref16"},{"journal-title":"Formal specification of the javacard api in jml the apdu class","year":"2000","author":"poll","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/s10009-005-0218-5","article-title":"Checking jml specifications using an extensible software model checking framework","volume":"8","author":"edwin rodn\u00e3guez","year":"2006","journal-title":"International Journal on Software Tools for Technology Transfer (STTT)"},{"key":"ref19","first-page":"222","article-title":"Model checking with edge-valued decision diagrams","author":"roux","year":"2010","journal-title":"NASA Formal Methods Symposium (NFM) NASA\/CP-2010&#x2013;216215"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081741"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11415787_25"},{"key":"ref5","first-page":"195","article-title":"Practical API protocol checking with access permissions","author":"kevin","year":"2009","journal-title":"Proceedings of the ECOOP 99 European Conference on Object-oriented Programming"},{"key":"ref8","article-title":"Verifying jml specifications with model fields","author":"breunesse","year":"2003","journal-title":"Technical report In Formal Techniques for Java-like Programs Proceedings of the European Conference on Object-Oriented Programming ECOOP 2003 Workshop"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45337-7_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1181195.1181212"},{"journal-title":"The pulse tool","year":"0","author":"ahmed","key":"ref1"},{"key":"ref9","first-page":"26","article-title":"Chase: A static checker for jml's assignable clause","author":"catano","year":"2003","journal-title":"VMCAI 2003 Proc of the 4th International Conference on Verification Model Checking and Abstract Interpretation"},{"key":"ref20","article-title":"Automated verification of specifications with typestates and access permissions","volume":"53","author":"siminiceanu","year":"2012","journal-title":"11th International Workshop on Automated Verification of Critical Systems (AVoCS)"},{"journal-title":"Modern Operating Systems","year":"2007","author":"tanenbaum","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"}],"event":{"name":"2018 International Conference on Advancements in Computational Sciences (ICACS)","start":{"date-parts":[[2018,2,19]]},"location":"Lahore, Pakistan","end":{"date-parts":[[2018,2,21]]}},"container-title":["2018 International Conference on Advancements in Computational Sciences (ICACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8327693\/8333267\/08333496.pdf?arnumber=8333496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T18:22:56Z","timestamp":1643394176000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8333496\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icacs.2018.8333496","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}