{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T10:26:20Z","timestamp":1725445580071},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.1979.762581","type":"proceedings-article","created":{"date-parts":[[2005,8,25]],"date-time":"2005-08-25T02:35:58Z","timestamp":1124937358000},"page":"680-687","source":"Crossref","is-referenced-by-count":0,"title":["Attaining software product integrity"],"prefix":"10.1109","author":[{"given":"E.","family":"Bersoff","sequence":"first","affiliation":[]},{"given":"V.","family":"Henderson","sequence":"additional","affiliation":[]},{"given":"S.","family":"Siegel","sequence":"additional","affiliation":[]}],"member":"263","event":{"name":"COMPSAC 79. Computer Software and The IEEE Computer Society's Third International Applications Conference, 1979.","location":"Chicago, IL"},"container-title":["COMPSAC 79. Proceedings. Computer Software and The IEEE Computer Society's Third International Applications Conference, 1979."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6188\/16515\/00762581.pdf?arnumber=762581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T23:16:24Z","timestamp":1489187784000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/762581\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.1979.762581","relation":{},"subject":[]}}