{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:12:56Z","timestamp":1725664376846},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540585558"},{"type":"electronic","value":"9783540490319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58555-9_88","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T16:36:43Z","timestamp":1330274203000},"page":"66-82","source":"Crossref","is-referenced-by-count":1,"title":["Specification and analysis of a security management system"],"prefix":"10.1007","author":[{"given":"Omar","family":"Cherkaoui","sequence":"first","affiliation":[]},{"given":"Nathalie","family":"Rico","sequence":"additional","affiliation":[]},{"given":"Alan","family":"Bernardi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,1]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Bean, A., Wood, D. and Fairclough, W., \u201cSpecifying Goal-Oriented Network Management Systems\u201d, IEEE Communication Magazine, May 1993.","DOI":"10.1109\/35.212419"},{"issue":"no.1","key":"6_CR2","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/0169-7552(87)90085-7","volume":"14","author":"T. Bolognesi","year":"1988","unstructured":"Bolognesi, T. and Brinksma, H., \u201cIntroduction to the ISO specification language LOTOS\u201d, Computer Networks and ISDN Systems, vol. 14, no.1, 1988, pp. 25\u201329.","journal-title":"Computer Networks and ISDN Systems"},{"key":"6_CR3","unstructured":"Commission of the European Communities, \u201cInformation Technology Security Evaluation Criteria (ITSEC), Office for Official Publications of the European Communities, 1991."},{"key":"6_CR4","unstructured":"Cherkaoui, O., Rico, N. and Obaid, A., \u201cSpecification and Analysis of Two Call Processing Systems using CCS\u201d, Technical Report, University du Qu\u00e9bec \u00e0 Montr\u00e9al, Juin 1993."},{"key":"6_CR5","unstructured":"Cherkaoui, O. and Rico, N., \u201cSpecification and Analysis of SONET Automatic Prrotection Switching\u201d, Technical Report, Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al, Juin 1993."},{"key":"6_CR6","unstructured":"Cleaveland, R., Parrow, J. and Steffen, B., \u201cThe Concurrency Workbench: A semantics-based verification tool for finite-state systems\u201d, Proceedings of Workshop on Automated Verification"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Cleaveland, R., \u201cTableau-based Model Checking in the Propositional Mu-Calculus\u201d, University of Sussex Technical Report 2\/89, March 1989.","DOI":"10.1007\/BF00264284"},{"key":"6_CR8","unstructured":"Department of Defence, \u201cTrusted Computer Security Evaluation Criteria\u201d, DOD 5200.28-STD, Dec. 1985."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Emerson, E., Srinivasan, J., \u201cBranching time temporal logic\u201d, in Springer Verlag LNCS 354, 1989.","DOI":"10.1007\/BFb0013022"},{"key":"6_CR10","unstructured":"ESTELLE: A formal description technique based on extended finite state machine, 1987."},{"key":"6_CR11","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/0304-3975(82)90125-6","volume":"27","author":"D. Kozen","year":"1983","unstructured":"Kozen, D., \u201cResults on the Propositional \u03bc-calculus\u201d, Theoretical Computer, 27, pp. 333\u2013354, 1983.","journal-title":"Theoretical Computer"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Milner, R., \u201cA Calculus of Communicating Systems\u201d, LNCS 92, Springer Verlag, 1980, 171p.","DOI":"10.1007\/3-540-10235-3"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Murata, T. and Zhang, D., \u201cA Predicate-Transition Net Model for Parallel Interpretation of Logic Programs\u201d, IEEE Trans, on Software Engineering, vol. 14, no.4, April 1988.","DOI":"10.1109\/32.4671"},{"key":"6_CR14","volume-title":"Communicating Sequential Processes","author":"C.A.R Hoare","year":"1985","unstructured":"Hoare, C.A.R, \u201cCommunicating Sequential Processes\u201d, Prentice Hall, New York, 1985."},{"key":"6_CR15","unstructured":"LOTOS: A formal description technique based on the temporal ordering of observational behavior, ISO DP 8807 (1988)."},{"key":"6_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0931-7","volume-title":"The temporal logic of reactive and concurrent systems specification","author":"Z. Manna","year":"1992","unstructured":"Manna, Z. and Pnueli, A., \u201cThe temporal logic of reactive and concurrent systems specification\u201d, Springer Verlag, N.-Y., 1992."},{"key":"6_CR17","first-page":"103","volume":"287","author":"J. Parrow","year":"1987","unstructured":"Parrow, J., \u201cSubmodule construction as Equation Solving in CCS\u201d, In Proceedings of the foundation of Software Technology and Theoretical Computer Science, LNCS 287, pp. 103\u2013123, 1987.","journal-title":"LNCS"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Shields, M.W., \u201cImplicit System Specification and the Interface Equation\u201d, The Computer Journal, vol.32, no.5, 1989.","DOI":"10.1093\/comjnl\/32.5.399"},{"key":"6_CR19","unstructured":"Stallings, W., \u201cA Network Security Primer\u201d, Computerworld, vol. XXIV, no.5, January 1990."},{"key":"6_CR20","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/0304-3975(90)90110-4","volume":"89","author":"C. Stirling","year":"1991","unstructured":"Stirling, C. and Walker, D., \u201cLocal model-checking in the modal \u03bc-calculus\u201d, Theorical Computer Science, 89,pp. 161\u2013177, 1991.","journal-title":"Theorical Computer Science"},{"key":"6_CR21","unstructured":"Walker D.J., \u201cAnalysis of Mutual Exclusion algorithms using CCS\u201d, University of Edimburgh, Technical Report ECS-LFCS-88-45, 1988,."}],"container-title":["Lecture Notes in Computer Science","FME '94: Industrial Benefit of Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58555-9_88.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,31]],"date-time":"2021-12-31T08:08:48Z","timestamp":1640938128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58555-9_88"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540585558","9783540490319"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-58555-9_88","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]}}}