{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:43Z","timestamp":1725549343887},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_37","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"307-322","source":"Crossref","is-referenced-by-count":0,"title":["From Security Protocols to Systems Security"],"prefix":"10.1007","author":[{"given":"Brian","family":"Monahan","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"12","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. CACM\u00a012, 993\u2013999 (1978)","journal-title":"CACM"},{"key":"37_CR2","volume-title":"Security Engineering","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering. Wiley, Chichester (2001)"},{"key":"37_CR3","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L. Paulson","year":"1998","unstructured":"Paulson, L.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Huth, M.: Secure Communicating Systems, Cambridge (2001)","DOI":"10.1017\/CBO9781139164870"},{"key":"37_CR5","series-title":"NATO Science Series","first-page":"39","volume-title":"Foundations of Secure Computation","author":"M. Abadi","year":"2000","unstructured":"Abadi, M.: Security Protocols and their Properties. In: Bauer, F.L., Steinbrueggen, R. (eds.) Foundations of Secure Computation, Marktoberdorf, Germany. NATO Science Series, pp. 39\u201360. IOS Press, Amsterdam (2000)"},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters\u00a056, 131\u2013136 (1995)","journal-title":"Information Processing Letters"},{"key":"37_CR7","volume-title":"Proc. IEEE Symposium on Security and Privacy 1996","author":"D. Gollmann","year":"1996","unstructured":"Gollmann, D.: What do we mean by Entity Authentication? In: Proc. IEEE Symposium on Security and Privacy 1996. IEEE Computer Society, Los Alamitos (1996)"},{"key":"37_CR8","unstructured":"Monahan, B.: Introducing ASPECT - a tool for checking protocol security. Technical Report HPL-2002-246, HP Labs (2002), http:\/\/www.hpl.hp.com\/techreports\/2002\/HPL-2002-246"},{"key":"37_CR9","first-page":"209","volume-title":"Proc. 30th Annual ACM Symp. On Theory of Computing, Perugia, Italy","author":"R. Cannetti","year":"1998","unstructured":"Cannetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited (preliminary version). In: Proc. 30th Annual ACM Symp. On Theory of Computing, Perugia, Italy, pp. 209\u2013218. ACM Press, New York (1998)"},{"key":"#cr-split#-37_CR10.1","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. Technical Report STAN-CS-81-854, Dept. of Computer Science, Stanford University (1981);","DOI":"10.1109\/SFCS.1981.32"},{"key":"#cr-split#-37_CR10.2","doi-asserted-by":"crossref","unstructured":"Also in Transactions on Information Theory 29(2), 198-208 (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"#cr-split#-37_CR11.1","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. In: Proceedings of the Royal Society of London A. Royal Society, vol.\u00a0426, pp. 233\u2013271 (1989);","DOI":"10.1145\/74850.74852"},{"key":"#cr-split#-37_CR11.2","doi-asserted-by":"crossref","unstructured":"Also publ. (condensed) in ACM Transactions on Computer Systems 8(1), 18-36 (February 1990)","DOI":"10.1145\/77648.77649"},{"key":"37_CR12","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"F.J. Thayer F\u00e1brega","year":"1999","unstructured":"Thayer F\u00e1brega, F.J., Herzog, J.C., Guttman, J.D.: Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security\u00a07, 191\u2013230 (1999)","journal-title":"Journal of Computer Security"},{"key":"37_CR13","volume-title":"Modelling and Analysis of Security Protocols","author":"P. Ryan","year":"2001","unstructured":"Ryan, P., Schneider, S.: Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2001)"},{"key":"37_CR14","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/CSFW.2001.930145","volume-title":"Proc. 14th IEEE Computer Security Foundations Workshop","author":"M. Rusinowitch","year":"2001","unstructured":"Rusinowitch, M., Turuani, M.: Protocol Insecurity with Finite Number of Sessions is NP-complete. In: Proc. 14th IEEE Computer Security Foundations Workshop, pp. 174\u2013187. IEEE, Los Alamitos (2001)"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Abadi, M., Gordon, A.: A calculus for cryptographic protocols: the Spi Calculus. Technical Report SRC-149, DEC-SRC (1998)","DOI":"10.1145\/266420.266432"},{"key":"37_CR16","volume-title":"Proc. of 1999 IEEE Computer Security Foundations Workshop","author":"A.W. Roscoe","year":"1999","unstructured":"Roscoe, A.W., Goldsmith, M.H.: What is intransitive non-interference? In: Proc. of 1999 IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"37_CR17","volume-title":"Proc. 1999 IEEE Computer Security Foundations Workshop","author":"P.Y.A. Ryan","year":"1999","unstructured":"Ryan, P.Y.A., Schneider, S.: Process algebra and non-interference. In: Proc. 1999 IEEE Computer Security Foundations Workshop, Mordano, Italy. IEEE Press, Mordano (1999)"},{"key":"37_CR18","unstructured":"Durgin, N.A., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: Undecidability of bounded security protocols. In: Proc. FLOC Workshop on Formal Methods in Security Protocols (1999)"},{"key":"37_CR19","first-page":"19","volume-title":"Cipher","author":"P. Ryan","year":"1991","unstructured":"Ryan, P.: A CSP formulation of non-interference. In: Cipher, pp. 19\u201327. IEEE Computer Society Press, Los Alamitos (1991)"},{"key":"37_CR20","series-title":"Electronic Notes in Theoretical Computer Science","volume-title":"DERA\/RHUL Workshop on Secure Architectures and Information Flow","author":"R. Focardi","year":"1999","unstructured":"Focardi, R., Gorreri, R., Martinelli, F.: Secrecy in Security Protocols as Non Interference. In: Schneider, S., Ryan, P. (eds.) DERA\/RHUL Workshop on Secure Architectures and Information Flow. Electronic Notes in Theoretical Computer Science, vol.\u00a032. Elsevier, Amsterdam (1999)"},{"key":"37_CR21","volume-title":"Proc. 8th ACM Conference on Computer and Communications Security","author":"J. Millen","year":"2001","unstructured":"Millen, J., Shmatikov, V.: Constraint solving for bounded process cryptographic protocol analysis. In: Proc. 8th ACM Conference on Computer and Communications Security. ACM, New York (2001)"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Foley, S.N.: A Non-Functional Approach to System Integrity. IEEE Journal on Selected Areas in Communications (2003)","DOI":"10.1109\/JSAC.2002.806124"},{"key":"37_CR23","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1016\/S0304-3975(02)00596-0","volume":"290","author":"F. Martinelli","year":"2003","unstructured":"Martinelli, F.: Analysis of security protocols as open systems. TCS\u00a0290, 1057\u20131106 (2003)","journal-title":"TCS"},{"key":"37_CR24","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/CSFW.2002.1021808","volume-title":"Proc. 15th IEEE Computer Security Foundations Workshop (CSFW 2002)","author":"A.D. Gordon","year":"2002","unstructured":"Gordon, A.D., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. In: Proc. 15th IEEE Computer Security Foundations Workshop (CSFW 2002), pp. 77\u201391. IEEE, Los Alamitos (2002)"},{"key":"37_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-44743-1_3","volume-title":"Parallel Computing Technologies","author":"C. Bodei","year":"2001","unstructured":"Bodei, C., Degano, P., Nielson, F., Riis Nielson, H.: Static analysis for secrecy and non-interference in networks of processes. In: Malyshkin, V.E. (ed.) PaCT 2001. LNCS, vol.\u00a02127, p. 27. Springer, Heidelberg (2001)"},{"key":"37_CR26","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/CSFW.2000.856924","volume-title":"Proc. 15th IEEE Computer Security Foundations Workshop","author":"I. Cervesato","year":"2000","unstructured":"Cervesato, I., Durgin, N., Mitchell, J.C., Lincoln, P., Scedrov, A.: Relating Strands and Multiset Rewriting for Security Protocol Analysis. In: Proc. 15th IEEE Computer Security Foundations Workshop, pp. 35\u201351. IEEE, Los Alamitos (2000)"},{"key":"37_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45608-2_1","volume-title":"Foundations of Security Analysis and Design","author":"P.Y.A. Ryan","year":"2001","unstructured":"Ryan, P.Y.A.: Mathematical Models of Computer Security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 1\u201362. Springer, Heidelberg (2001)"},{"key":"37_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-45608-2_2","volume-title":"Foundations of Security Analysis and Design","author":"P. Syverson","year":"2001","unstructured":"Syverson, P., Cervesato, I.: The Logic of Authentication Protocols. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 63\u2013137. Springer, Heidelberg (2001)"},{"key":"37_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samurati","year":"2001","unstructured":"Samurati, P., de Capitani di Vimercati, S.: Access Control: Policies, Models and Mechanism. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 137\u2013196. Springer, Heidelberg (2001)"},{"key":"37_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-45608-2_4","volume-title":"Foundations of Security Analysis and Design","author":"J.D. Guttman","year":"2001","unstructured":"Guttman, J.D.: Security Goals: Packet Trajectories and Strand Spaces. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 197\u2013261. Springer, Heidelberg (2001)"},{"key":"37_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/3-540-45608-2_5","volume-title":"Foundations of Security Analysis and Design","author":"A.D. Gordon","year":"2001","unstructured":"Gordon, A.D.: Notes on Nominal Calculi for Security and Mobility. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 262\u2013330. Springer, Heidelberg (2001)"},{"key":"37_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-45608-2_6","volume-title":"Foundations of Security Analysis and Design","author":"R. Focardi","year":"2001","unstructured":"Focardi, R., Gorreri, R.: Classification of Security Properties (Part 1: Information Flow). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 331\u2013396. Springer, Heidelberg (2001)"},{"key":"37_CR33","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M. Abadi","year":"2002","unstructured":"Abadi, M., Rogaway, P.: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). Journal of Cryptology\u00a015, 103\u2013127 (2002)","journal-title":"Journal of Cryptology"},{"key":"37_CR34","first-page":"184","volume-title":"Proc. of IEEE Symposium on Security and Privacy, Oakland, California","author":"B. Pfitzmann","year":"2001","unstructured":"Pfitzmann, B., Waidner, M.: A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, California, pp. 184\u2013200. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"37_CR35","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F. Nielson","year":"1999","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (1999)"},{"key":"37_CR36","doi-asserted-by":"crossref","unstructured":"Clark, D., Hankin, C., Hunt, S.: Information flow for Algol-like languages. Journal of Computer Languages (2002)","DOI":"10.1016\/S0096-0551(02)00006-1"},{"key":"37_CR37","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Myers, A.C.: Language Based Information Flow Security. IEEE Journal on selected areas in Communications 21 (2003)","DOI":"10.1109\/JSAC.2002.806121"},{"key":"37_CR38","unstructured":"Denker, G., Millen, J.K., Rue\u00df, H.: The CAPSL Integrated Protocol Environment. Technical Report SRI-CSL-2000-02, SRI, Menlo Park, California, USA (2000)"},{"key":"37_CR39","unstructured":"Denker, G., Millen, J.: CAPSL intermediate language. In: Proc. of FLoC Workshop on Formal Methods and Security Protocols (1999)"},{"key":"37_CR40","volume-title":"Distributed Systems Analysis with CCS","author":"G. Bruns","year":"1997","unstructured":"Bruns, G.: Distributed Systems Analysis with CCS. Prentice-Hall, Englewood Cliffs (1997)"},{"key":"37_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0928-4869(97)80777-X","volume":"5","author":"G. Birtwistle","year":"1997","unstructured":"Birtwistle, G., Tofts, C.: Relating Operational and Denotational Descriptions of Demos. Simulation Practice and Theory\u00a05, 1\u201333 (1997)","journal-title":"Simulation Practice and Theory"},{"key":"37_CR42","unstructured":"Monahan, B.: From Security Protocols to Systems Security - Making a case for systems security modelling. Technical Report HPL-2003-147, HP Labs (2003), http:\/\/www.hpl.hp.com\/techreports\/2003\/HPL-2003-147"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:22Z","timestamp":1605644302000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/11542322_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}