{"month":"07","date_created":"2018-12-11T12:08:36Z","citation":{"ieee":"P. Cerny and R. Alur, “Automated Analysis of Java Methods for Confidentiality,” presented at the CAV: Computer Aided Verification, 2009, pp. 173–187.","short":"P. Cerny, R. Alur, in:, Springer, 2009, pp. 173–187.","mla":"Cerny, Pavol, and Rajeev Alur. Automated Analysis of Java Methods for Confidentiality. Springer, 2009, pp. 173–87, doi:1548.","ama":"Cerny P, Alur R. Automated Analysis of Java Methods for Confidentiality. In: Springer; 2009:173-187. doi:1548","apa":"Cerny, P., & Alur, R. (2009). Automated Analysis of Java Methods for Confidentiality (pp. 173–187). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/1548","chicago":"Cerny, Pavol, and Rajeev Alur. “Automated Analysis of Java Methods for Confidentiality,” 173–87. Springer, 2009. https://doi.org/1548.","ista":"Cerny P, Alur R. 2009. Automated Analysis of Java Methods for Confidentiality. CAV: Computer Aided Verification, LNCS, , 173–187."},"date_published":"2009-07-01T00:00:00Z","day":"01","year":"2009","status":"public","publisher":"Springer","page":"173 - 187","extern":1,"type":"conference","date_updated":"2021-01-12T07:56:37Z","publist_id":"1067","publication_status":"published","quality_controlled":0,"alternative_title":["LNCS"],"title":"Automated Analysis of Java Methods for Confidentiality","_id":"4391","conference":{"name":"CAV: Computer Aided Verification"},"doi":"1548","author":[{"full_name":"Pavol Cerny","first_name":"Pavol","id":"4DCBEFFE-F248-11E8-B48F-1D18A9856A87","last_name":"Cerny"},{"full_name":"Alur, Rajeev","first_name":"Rajeev","last_name":"Alur"}]}