{"publisher":"Springer","publication_status":"published","conference":{"name":"CAV: Computer Aided Verification"},"month":"07","title":"Automated Analysis of Java Methods for Confidentiality","doi":"1548","_id":"4391","citation":{"apa":"Cerny, P., & Alur, R. (2009). Automated Analysis of Java Methods for Confidentiality (pp. 173–187). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/1548","short":"P. Cerny, R. Alur, in:, Springer, 2009, pp. 173–187.","chicago":"Cerny, Pavol, and Rajeev Alur. “Automated Analysis of Java Methods for Confidentiality,” 173–87. Springer, 2009. https://doi.org/1548.","mla":"Cerny, Pavol, and Rajeev Alur. Automated Analysis of Java Methods for Confidentiality. Springer, 2009, pp. 173–87, doi:1548.","ieee":"P. Cerny and R. Alur, “Automated Analysis of Java Methods for Confidentiality,” presented at the CAV: Computer Aided Verification, 2009, pp. 173–187.","ista":"Cerny P, Alur R. 2009. Automated Analysis of Java Methods for Confidentiality. CAV: Computer Aided Verification, LNCS, , 173–187.","ama":"Cerny P, Alur R. Automated Analysis of Java Methods for Confidentiality. In: Springer; 2009:173-187. doi:1548"},"type":"conference","date_created":"2018-12-11T12:08:36Z","status":"public","date_updated":"2021-01-12T07:56:37Z","alternative_title":["LNCS"],"date_published":"2009-07-01T00:00:00Z","quality_controlled":0,"day":"01","year":"2009","publist_id":"1067","extern":1,"author":[{"first_name":"Pavol","full_name":"Pavol Cerny","id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87","last_name":"Cerny"},{"last_name":"Alur","first_name":"Rajeev","full_name":"Alur, Rajeev"}],"page":"173 - 187"}