{"title":"Automated Analysis of Java Methods for Confidentiality","conference":{"name":"CAV: Computer Aided Verification"},"doi":"1548","citation":{"mla":"Cerny, Pavol, and Rajeev Alur. Automated Analysis of Java Methods for Confidentiality. Springer, 2009, pp. 173–87, doi:1548.","ama":"Cerny P, Alur R. Automated Analysis of Java Methods for Confidentiality. In: Springer; 2009:173-187. doi:1548","ista":"Cerny P, Alur R. 2009. Automated Analysis of Java Methods for Confidentiality. CAV: Computer Aided Verification, LNCS, , 173–187.","chicago":"Cerny, Pavol, and Rajeev Alur. “Automated Analysis of Java Methods for Confidentiality,” 173–87. Springer, 2009. https://doi.org/1548.","ieee":"P. Cerny and R. Alur, “Automated Analysis of Java Methods for Confidentiality,” presented at the CAV: Computer Aided Verification, 2009, pp. 173–187.","apa":"Cerny, P., & Alur, R. (2009). Automated Analysis of Java Methods for Confidentiality (pp. 173–187). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/1548","short":"P. Cerny, R. Alur, in:, Springer, 2009, pp. 173–187."},"year":"2009","type":"conference","publisher":"Springer","_id":"4391","publication_status":"published","status":"public","day":"01","date_published":"2009-07-01T00:00:00Z","page":"173 - 187","alternative_title":["LNCS"],"date_created":"2018-12-11T12:08:36Z","date_updated":"2021-01-12T07:56:37Z","extern":1,"publist_id":"1067","author":[{"full_name":"Pavol Cerny","first_name":"Pavol","last_name":"Cerny","id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87"},{"last_name":"Alur","first_name":"Rajeev","full_name":"Alur, Rajeev"}],"quality_controlled":0,"month":"07"}