{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T00:54:19Z","timestamp":1672966459619},"reference-count":19,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2005,5,1]],"date-time":"2005-05-01T00:00:00Z","timestamp":1114905600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3011,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2005,5]]},"DOI":"10.1016\/j.entcs.2005.01.032","type":"journal-article","created":{"date-parts":[[2005,5,18]],"date-time":"2005-05-18T13:23:08Z","timestamp":1116422588000},"page":"113-129","source":"Crossref","is-referenced-by-count":4,"title":["An Abstract Interpretation-based Approach to Mobile Code Safety"],"prefix":"10.1016","volume":"132","author":[{"given":"Elvira","family":"Albert","sequence":"first","affiliation":[]},{"given":"Germ\u00e1n","family":"Puebla","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Hermenegildo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.entcs.2005.01.032_bib001","series-title":"Proc. of CADE'02","first-page":"31","article-title":"Temporal logic for proof-carrying code","author":"Bernard","year":"2002"},{"key":"10.1016\/j.entcs.2005.01.032_bib002","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/0743-1066(91)80001-T","article-title":"A Practical Framework for the Abstract Interpretation of Logic Programs","volume":"10","author":"Bruynooghe","year":"1991","journal-title":"Journal of Logic Programming"},{"key":"10.1016\/j.entcs.2005.01.032_bib003","series-title":"Proc. of POPL'77","first-page":"238","article-title":"Abstract Interpretation: a Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints","author":"Cousot","year":"1977"},{"key":"10.1016\/j.entcs.2005.01.032_bib004","series-title":"Types in Logic Programming","first-page":"157","article-title":"A Regular Type Language for Logic Programs","author":"Dart","year":"1992"},{"key":"10.1016\/j.entcs.2005.01.032_bib005","series-title":"Proc. LICS'91","first-page":"300","article-title":"Logic programs as types for logic programs","author":"Fr\u00fcwirth","year":"1991"},{"issue":"2,3","key":"10.1016\/j.entcs.2005.01.032_bib006","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1023\/A:1012936614361","article-title":"Regular tree languages as an abstract domain in program specialisation","volume":"14","author":"Gallagher","year":"2001","journal-title":"Higher Order and Symbolic Computation"},{"key":"10.1016\/j.entcs.2005.01.032_bib007","series-title":"Proc. of SAS'03","first-page":"127","article-title":"Program Development Using Abstract Interpretation (and The Ciao System Preprocessor)","volume":"2694","author":"Hermenegildo","year":"2003"},{"issue":"2","key":"10.1016\/j.entcs.2005.01.032_bib008","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/349214.349216","article-title":"Incremental Analysis of Constraint Logic Programs","volume":"22","author":"Hermenegildo","year":"2000","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1016\/j.entcs.2005.01.032_bib009","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/0743-1066(94)90033-7","article-title":"Constraint Logic Programming: A Survey","volume":"19\/20","author":"Jaffar","year":"1994","journal-title":"Journal of Logic Programming"},{"issue":"3\u20134","key":"10.1016\/j.entcs.2005.01.032_bib010","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1025055424017","article-title":"Java bytecode verification: algorithms and formalizations","volume":"30","author":"Leroy","year":"2003","journal-title":"Journal of Automated Reasoning"},{"key":"10.1016\/j.entcs.2005.01.032_bib011","series-title":"The Java Virtual Machine Specification","author":"Lindholm","year":"1997"},{"issue":"3","key":"10.1016\/j.entcs.2005.01.032_bib012","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1145\/319301.319345","article-title":"From system F to typed assembly language","volume":"21","author":"Morrisett","year":"1999","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1016\/j.entcs.2005.01.032_bib013","series-title":"Proc. of POPL'97","first-page":"106","article-title":"Proof-Carrying Code","author":"Necula","year":"1997"},{"key":"10.1016\/j.entcs.2005.01.032_bib014","series-title":"Proc. of PLDI'98","article-title":"The Design and Implementation of a Certifying Compiler","author":"Necula","year":"1998"},{"key":"10.1016\/j.entcs.2005.01.032_bib015","series-title":"Analysis and Visualization Tools for Constraint Programming","first-page":"23","article-title":"An Assertion Language for Constraint Logic Programs","volume":"1870","author":"Puebla","year":"2000"},{"key":"10.1016\/j.entcs.2005.01.032_bib016","series-title":"Proc. of SAS'96","first-page":"270","article-title":"Optimized Algorithms for the Incremental Analysis of Logic Programs","volume":"1145","author":"Puebla","year":"1996"},{"key":"10.1016\/j.entcs.2005.01.032_bib017","unstructured":"K. Rose, E. Rose. Lightweight bytecode verification. In OOPSALA Workshop on Formal Underpinnings of Java, 1998"},{"key":"10.1016\/j.entcs.2005.01.032_bib018","series-title":"Proc. of SOSP'03","first-page":"15","article-title":"Model-carrying code: A practical approach for safe execution of untrusted applications","author":"Sekar","year":"2003"},{"key":"10.1016\/j.entcs.2005.01.032_bib019","series-title":"Proc. of SAS'02","first-page":"102","article-title":"More precise yet efficient type inference for logic programs","volume":"2477","author":"Vaucheret","year":"2002"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105050085?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105050085?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,1,26]],"date-time":"2019-01-26T11:24:18Z","timestamp":1548501858000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066105050085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,5]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,5]]}},"alternative-id":["S1571066105050085"],"URL":"https:\/\/doi.org\/10.1016\/j.entcs.2005.01.032","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2005,5]]}}}