{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:36:45Z","timestamp":1743010605690,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319681665"},{"type":"electronic","value":"9783319681672"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68167-2_9","type":"book-chapter","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T23:50:53Z","timestamp":1506383453000},"page":"119-138","source":"Crossref","is-referenced-by-count":0,"title":["Tests and Refutation"],"prefix":"10.1007","author":[{"given":"Mohammad Torabi","family":"Dashti","sequence":"first","affiliation":[]},{"given":"David","family":"Basin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Lamport, L.: The existence of refinement mappings. In: LICS, pp. 165\u2013175. IEEE (1988)","DOI":"10.1109\/LICS.1988.5115"},{"issue":"4","key":"9_CR2","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/0020-0190(85)90056-0","volume":"21","author":"B Alpern","year":"1985","unstructured":"Alpern, B., Schneider, F.: Defining liveness. Inf. Process. Lett. 21(4), 181\u2013185 (1985)","journal-title":"Inf. Process. Lett."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Barthe, G., D\u2019Argenio, P.R., Rezk, T.: Secure information flow by self-composition. In: CSFW 2004, pp. 100\u2013114. IEEE Computer Society (2004)","DOI":"10.1109\/CSFW.2004.1310735"},{"issue":"6","key":"9_CR4","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.3233\/JCS-2009-0393","volume":"18","author":"MR Clarkson","year":"2010","unstructured":"Clarkson, M.R., Schneider, F.B.: Hyperproperties. J. Comput. Secur. 18(6), 1157\u20131210 (2010)","journal-title":"J. Comput. Secur."},{"issue":"1","key":"9_CR5","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/A:1011227529550","volume":"19","author":"W Damm","year":"2001","unstructured":"Damm, W., Harel, D.: LSCs: breathing life into message sequence charts. Formal Methods Syst. Des. 19(1), 45\u201380 (2001)","journal-title":"Formal Methods Syst. Des."},{"key":"9_CR6","unstructured":"Dijkstra, E.W.: Notes on structured programming. Technical report T.H. Report 70-WSK-03, Technological University Eindhoven, April 1970"},{"issue":"1","key":"9_CR7","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1145\/4904.4999","volume":"33","author":"EA Emerson","year":"1986","unstructured":"Emerson, E.A., Halpern, J.: \u201cSometimes\u201d and \u201cNot Never\u201d revisited: on branching versus linear time temporal logic. J. ACM 33(1), 151\u2013178 (1986)","journal-title":"J. ACM"},{"issue":"4","key":"9_CR8","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s10009-011-0220-z","volume":"14","author":"Y Falcone","year":"2012","unstructured":"Falcone, Y., Fernandez, J.-C., J\u00e9ron, T., Marchand, H., Mounier, L.: More testable properties. STTT 14(4), 407\u2013437 (2012)","journal-title":"STTT"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/3-540-59293-8_188","volume-title":"TAPSOFT \u201995: Theory and Practice of Software Development","author":"M-C Gaudel","year":"1995","unstructured":"Gaudel, M.-C.: Testing can be formal, too. In: Mosses, P.D., Nielsen, M., Schwartzbach, M.I. (eds.) CAAP 1995. LNCS, vol. 915, pp. 82\u201396. Springer, Heidelberg (1995). doi:\n10.1007\/3-540-59293-8_188"},{"issue":"2","key":"9_CR10","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/TSE.1975.6312836","volume":"1","author":"J Goodenough","year":"1975","unstructured":"Goodenough, J., Gerhart, S.: Toward a theory of test data selection. IEEE Trans. Softw. Eng. 1(2), 156\u2013173 (1975)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"9_CR11","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"KW Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Program. Lang. Syst. 28(1), 175\u2013205 (2006)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"9_CR12","volume-title":"Unifying Theories of Programming","author":"CAR Hoare","year":"1998","unstructured":"Hoare, C.A.R., Jifeng, H.: Unifying Theories of Programming. Prentice Hall, Englewood Cliffs (1998)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Larsen, K., Thomsen, B.: A modal process logic. In: LICS, pp. 203\u2013210. IEEE (1988)","DOI":"10.1109\/LICS.1988.5119"},{"key":"9_CR14","unstructured":"Morgan, C.: Programming from Specifications. Prentice Hall (1998)"},{"key":"9_CR15","volume-title":"The Art of Software Testing","author":"G Myers","year":"2011","unstructured":"Myers, G., Sandler, C., Badgett, T.: The Art of Software Testing. Wiley, Hoboken (2011)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Ngo, M., Massacci, F., Milushev, D., Piessens, F.: Runtime enforcement of security policies on black box reactive programs. In: POPL 2015, pp. 43\u201354. ACM (2015)","DOI":"10.1145\/2676726.2676978"},{"key":"9_CR17","volume-title":"Principles of Program Analysis","author":"F Nielson","year":"2005","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (2005)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: FOCS 1977, pp. 46\u201357. IEEE (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"9_CR19","volume-title":"Conjectures and Refutations: The Growth of Scientific Knowledge","author":"K Popper","year":"1963","unstructured":"Popper, K.: Conjectures and Refutations: The Growth of Scientific Knowledge. Routledge, London (1963)"},{"key":"9_CR20","volume-title":"Theory of Recursive Functions and Effective Computability","author":"H Rogers Jr","year":"1987","unstructured":"Rogers Jr., H.: Theory of Recursive Functions and Effective Computability. MIT Press, Cambridge (1987)"},{"issue":"9","key":"9_CR21","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/TSE.2016.2532875","volume":"42","author":"S Segura","year":"2016","unstructured":"Segura, S., Fraser, G., Sanchez, A.B., Ruiz-Cortes, A.: A survey on metamorphic testing. IEEE Trans. Software Eng. 42(9), 805\u2013824 (2016)","journal-title":"IEEE Trans. Software Eng."},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-01001-9_26","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009). doi:\n10.1007\/978-3-642-01001-9_26"},{"issue":"5","key":"9_CR23","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-78917-8_1","volume-title":"Formal Methods and Testing","author":"J Tretmans","year":"2008","unstructured":"Tretmans, J.: Model based testing with labelled transition systems. In: Hierons, R.M., Bowen, J.P., Harman, M. (eds.) Formal Methods and Testing. LNCS, vol. 4949, pp. 1\u201338. Springer, Heidelberg (2008). doi:\n10.1007\/978-3-540-78917-8_1"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/BFb0039066","volume-title":"CONCUR \u201990 Theories of Concurrency: Unification and Extension","author":"RJ Glabbeek","year":"1990","unstructured":"Glabbeek, R.J.: The linear time - branching time spectrum. In: Baeten, J.C.M., Klop, J.W. (eds.) CONCUR 1990. LNCS, vol. 458, pp. 278\u2013297. Springer, Heidelberg (1990). doi:\n10.1007\/BFb0039066"},{"issue":"237","key":"9_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/mind\/LX.237.1","volume":"60","author":"GH Wright von","year":"1951","unstructured":"von Wright, G.H.: Deontic logic. Mind 60(237), 1\u201315 (1951)","journal-title":"Mind"},{"issue":"12","key":"9_CR27","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TSE.1986.6313008","volume":"12","author":"EJ Weyuker","year":"1986","unstructured":"Weyuker, E.J.: Axiomatizing software test data adequacy. IEEE Trans. Softw. Eng. 12(12), 1128\u20131138 (1986)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68167-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:50:44Z","timestamp":1507002644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68167-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319681665","9783319681672"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68167-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}