{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:32:03Z","timestamp":1767706323366},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.15439\/2018f262","type":"proceedings-article","created":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T07:17:39Z","timestamp":1537946259000},"page":"707-714","source":"Crossref","is-referenced-by-count":7,"title":["Applying Formal Methods to Specify Security Requirements in Multi\u2013Agent Systems"],"prefix":"10.15439","volume":"15","author":[{"given":"Vinitha Hannah","family":"Subburaj","sequence":"first","affiliation":[]},{"given":"Joseph E.","family":"Urban","sequence":"additional","affiliation":[]}],"member":"6175","published-online":{"date-parts":[[2018,9,26]]},"event":{"name":"2018 Federated Conference on Computer Science and Information Systems","start":{"date-parts":[[2018,9,9]]},"end":{"date-parts":[[2018,9,12]]},"acronym":"FedCSIS 2018"},"container-title":["Annals of Computer Science and Information Systems","Proceedings of the 2018 Federated Conference on Computer Science and Information Systems"],"original-title":[],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T10:02:54Z","timestamp":1724925774000},"score":1,"resource":{"primary":{"URL":"https:\/\/annals-csis.org\/Volume_15\/drp\/262.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,26]]},"references-count":0,"URL":"https:\/\/doi.org\/10.15439\/2018f262","relation":{},"ISSN":["2300-5963"],"issn-type":[{"type":"print","value":"2300-5963"}],"subject":[],"published":{"date-parts":[[2018,9,26]]}}}