{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T15:50:56Z","timestamp":1775404256637,"version":"3.50.1"},"reference-count":7,"publisher":"Allerton Press","issue":"7","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619070034","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T10:02:40Z","timestamp":1583316160000},"page":"683-688","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["On Safety of Unary and Nonunary IFP Operators"],"prefix":"10.3103","volume":"53","author":[{"given":"S. M.","family":"Dudakov","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7169_CR1","volume-title":"Relational completeness of data base sublanguages, in Database Systems","author":"E.F. Codd","year":"1972","unstructured":"Codd, E.F., Relational completeness of data base sublanguages, in Database Systems, Rustin, R., Ed., Prentice-Hall, 1972, pp. 33\u201364."},{"key":"7169_CR2","unstructured":"Dudakov S. M., On safety of recursive queries, Vestn. Tversk. Gos. Univ., Ser.: Prikl. Mat., 2012, no. 4, pp. 71\u201380."},{"key":"7169_CR3","unstructured":"Dudakov S.M., On safety of IFP-operators and recursive queries, Vestn. Tversk. Gos. Univ., Ser.: Prikl. Mat., 2013, no. 2, pp. 5\u201313."},{"key":"7169_CR4","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1134\/S1995080215040022","volume":"36","author":"S.M. Dudakov","year":"2015","unstructured":"Dudakov, S.M., On inflationary fix-point operators safety, Lobachevskii J. Math., 2015, vol. 36, no. 4, pp. 328\u2013331.","journal-title":"Lobachevskii J. Math."},{"key":"7169_CR5","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0168-0072(86)90055-2","volume":"32","author":"Y. Gurevich","year":"1986","unstructured":"Gurevich, Y. and Shelah, S., Fixed-point extensions of first-order logic, Ann. Pure Appl. Logic, 1986, vol. 32, pp. 265\u2013280.","journal-title":"Ann. Pure Appl. Logic"},{"key":"7169_CR6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1006\/jcss.1995.1051","volume":"51","author":"P. Kanellakis","year":"1995","unstructured":"Kanellakis, P., Kuper, G., and Revesz, P., Constraint query languages, J. Comput. Syst. Sci., 1995, vol. 51, no.\u00a01, pp. 26\u201352.","journal-title":"J. Comput. Syst. Sci."},{"key":"7169_CR7","volume-title":"Model Theory: An Introduction","author":"D. Marker","year":"2002","unstructured":"Marker, D., Model Theory: An Introduction, New York: Springer-Verlag, 2002."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619070034.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619070034","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619070034.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:58:34Z","timestamp":1773611914000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619070034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":7,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7169"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619070034","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"10 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}