{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:05Z","timestamp":1763468225110,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T00:00:00Z","timestamp":1396915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004837","name":"Ministerio de Ciencia e Innovaci\u00f3n","doi-asserted-by":"publisher","award":["TIN2010-21062-C02-02"],"award-info":[{"award-number":["TIN2010-21062-C02-02"]}],"id":[{"id":"10.13039\/501100004837","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003359","name":"Generalitat Valenciana","doi-asserted-by":"publisher","award":["PROMETEO2011\/052"],"award-info":[{"award-number":["PROMETEO2011\/052"]}],"id":[{"id":"10.13039\/501100003359","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS 09-04749, CCF 09-05584, CNS 13-19109"],"award-info":[{"award-number":["CNS 09-04749, CCF 09-05584, CNS 13-19109"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS 09-04749, CCF 09-05584, CNS 13-19109"],"award-info":[{"award-number":["CNS 09-04749, CCF 09-05584, CNS 13-19109"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"DOI":"10.1145\/2600176.2600186","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T13:53:50Z","timestamp":1407851630000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A rewriting-based forwards semantics for Maude-NPA"],"prefix":"10.1145","author":[{"given":"Santiago","family":"Escobar","sequence":"first","affiliation":[{"name":"DSIC-ELP, Universitat Polit\u00e8cnica de Val\u00e8ncia, Spain"}]},{"given":"Catherine","family":"Meadows","sequence":"additional","affiliation":[{"name":"Naval Research Laboratory, Washington DC"}]},{"given":"Jos\u00e9","family":"Meseguer","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Sonia","family":"Santiago","sequence":"additional","affiliation":[{"name":"DSIC-ELP, Universitat Polit\u00e8cnica de Val\u00e8ncia, Spain"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360213"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_15"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/872752.873511"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-005-9019-5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11805618_9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363528"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","volume-title":"How to Specify, Program and Verify Systems in Rewriting Logic","author":"Clavel M.","year":"2007","unstructured":"M. Clavel , F. Dur\u00e1n , S. Eker , P. Lincoln , N. Mart\u00ed-Oliet , J. Meseguer , and C. L. Talcott , editors . All About Maude - A High-Performance Logical Framework , How to Specify, Program and Verify Systems in Rewriting Logic , volume 4350 of Lecture Notes in Computer Science . Springer , 2007 . M. Clavel, F. Dur\u00e1n, S. Eker, P. Lincoln, N. Mart\u00ed-Oliet, J. Meseguer, and C. L. Talcott, editors. All About Maude - A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Rewriting Logic, volume 4350 of Lecture Notes in Computer Science. Springer, 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32033-3_22"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/358722.358740"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03829-7_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/353594.353603"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/0215084"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646480.693776"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2958031.2958047"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(92)90182-F"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"J.\n      Meseguer\n    .\n  Membership algebra as a logical framework for equational specification\n  . In F. Parisi-Presicce editor WADT volume \n  1376\n   of \n  Lecture Notes in Computer Science pages \n  18\n  --\n  61\n  . \n  Springer 1997\n  .   J. Meseguer. Membership algebra as a logical framework for equational specification. In F. Parisi-Presicce editor WADT volume 1376 of Lecture Notes in Computer Science pages 18--61. Springer 1997.","DOI":"10.1007\/3-540-64299-4_26"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884384"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"R.\n      Sasse S.\n      Escobar C.\n      Meadows and \n      J.\n      Meseguer\n  . \n  Protocol analysis modulo combination of theories: A case study in maude-npa\n  . In J. Cu\u00e9llar J. Lopez G. Barthe and A. Pretschner editors STM volume \n  6710\n   of \n  Lecture Notes in Computer Science pages \n  163\n  --\n  178\n  . \n  Springer 2010\n  .   R. Sasse S. Escobar C. Meadows and J. Meseguer. Protocol analysis modulo combination of theories: A case study in maude-npa. In J. Cu\u00e9llar J. Lopez G. Barthe and A. Pretschner editors STM volume 6710 of Lecture Notes in Computer Science pages 163--178. Springer 2010.","DOI":"10.1007\/978-3-642-22444-7_11"},{"volume-title":"Term Rewriting Systems","year":"2003","key":"e_1_3_2_1_22_1","unstructured":"TeReSe , editor. Term Rewriting Systems . Cambridge University Press , Cambridge , 2003 . TeReSe, editor. Term Rewriting Systems. Cambridge University Press, Cambridge, 2003."}],"event":{"name":"HotSoS '14: Symposium and Bootcamp on the Science of Security","sponsor":["No. Carolina State Univeresity North Carolina State University"],"location":"Raleigh North Carolina USA","acronym":"HotSoS '14"},"container-title":["Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600186","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600176.2600186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:25Z","timestamp":1750234225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":22,"alternative-id":["10.1145\/2600176.2600186","10.1145\/2600176"],"URL":"https:\/\/doi.org\/10.1145\/2600176.2600186","relation":{},"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}