{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:34:44Z","timestamp":1736573684572,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540388623"},{"type":"electronic","value":"9783540388654"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11841197_16","type":"book-chapter","created":{"date-parts":[[2006,9,11]],"date-time":"2006-09-11T07:59:47Z","timestamp":1157961587000},"page":"242-256","source":"Crossref","is-referenced-by-count":1,"title":["Application of Model Checking to AXML System\u2019s Security: A Case Study"],"prefix":"10.1007","author":[{"given":"Il-Gon","family":"Kim","sequence":"first","affiliation":[]},{"given":"Debmalya","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Abiteboul, S., Benjelloun, O., Cautis, B., Manolescu, I., Milo, T., Preda, N.: Lazy Query Evaluation for Active XML. In: Proceedings of ACM SIGMOD Conference, pp. 227\u2013238 (2004)","DOI":"10.1145\/1007568.1007596"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1007\/11687238_61","volume-title":"Advances in Database Technology - EDBT 2006","author":"S. Abiteboul","year":"2006","unstructured":"Abiteboul, S., Manolescu, I., Taropa, F.: A Framework for Distributed XML Data Management. In: Ioannidis, Y., Scholl, M.H., Schmidt, J.W., Matthes, F., Hatzopoulos, M., B\u00f6hm, K., Kemper, A., Grust, T., B\u00f6hm, C. (eds.) EDBT 2006. LNCS, vol.\u00a03896, pp. 1049\u20131058. Springer, Heidelberg (2006)"},{"key":"16_CR3","unstructured":"Active XML Home Page (AXML) (2004), http:\/\/activexml.net"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-540-30101-1_9","volume-title":"Formal Methods for Components and Objects","author":"K. Bhargavan","year":"2004","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: TulaFale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol.\u00a03188, pp. 197\u2013222. Springer, Heidelberg (2004)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Abiteboul, S., Alexe, B., Benjelloun, O., Cautis, B., Fundulaki, I., Milo, T., Sahuguet, A.: An Electronic Patient Record on Steroids: Distributed, Peer-to-Peer, Secure and Privacy-conscious. In: Proceedings of the 30th VLDB Conference, pp. 1273\u20131276 (2004)","DOI":"10.1016\/B978-012088469-8\/50125-X"},{"key":"16_CR6","unstructured":"Abiteboul, S., Benjelloun, O., Cautis, B., Milo, T.: Active XML, Security and Access Control. In: Proceedings of the SBBD Workshop, pp. 13\u201322 (2004)"},{"key":"16_CR7","unstructured":"Eastlake, D., Reagle, J., Imamura, T., Dillaway, B., Simon, E.: XML-Encryption synatx and Proceeding, W3C Recommendation (2001)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Reagle, J., Solo, D., Bartel, M., Boyer, J., Fox, B., LaMacchia, B., Simon, E.: XML-Signature Syntax and Processing, W3C Recommendation (2002)","DOI":"10.17487\/rfc3075"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes (1985)","DOI":"10.1007\/978-3-642-82921-5_4"},{"issue":"1\/2","key":"16_CR10","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-2001-91-202","volume":"9","author":"M.L. Hui","year":"2001","unstructured":"Hui, M.L., Lowe, G.: Fault-preserving Simplifying Transformations for Security Protocols. Journal of Computer Security\u00a09(1\/2), 3\u201346 (2001)","journal-title":"Journal of Computer Security"},{"key":"16_CR11","unstructured":"Formal Systems (Europe) Ltd. FDR2 User Manual (August 1999)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"IBM, Microsoft, and VeriSign, Web Services Security(WS-Security), Version 1.0 (April 2002)","DOI":"10.1016\/S1353-4858(02)00401-4"},{"key":"16_CR13","unstructured":"Kim, I.G., Biswa, D.: Secure Data Management based on AXML Document: Electronic Patient Record (submitted, 2006)"},{"key":"16_CR14","unstructured":"Kleiner, E., Roscoe, A.W.: Web Services Security: a preliminary study using Casper and FDR. In: Proceedings of Automated Reasoning for Security Protocol Analysis (ARSPA 2004) (2004)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Kleiner, E., Roscoe, A.W.: On the Relationship between Web Services Security and Traditional Protocols. In: DIMACS Workshop on Security of Web Services and E-Commerce (2005)","DOI":"10.1016\/j.entcs.2005.11.074"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Tobarra, L., Cazorla, D., Cuartero, F., Diaz, G.: Applicatoin of Formal Methods to the Analysis of Web Services Security. In: 2nd International Workshop on Web Services and Formal Methods, pp. 215\u2013229 (2005)","DOI":"10.1007\/11549970_16"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A Compiler for the Analysis of Security Protocols. In: Proceedings of the 10th Computer Security Foundations Workshop (1997)","DOI":"10.1109\/CSFW.1997.596779"},{"key":"16_CR19","unstructured":"Microsoft, Microsoft Web Services Enhancements (WSE) 2.0, In: Proceedings of ACM SIGMOD, pp.289-300 (2003), http:\/\/msdn.microsoft.com\/webservices\/building\/wse"},{"key":"16_CR20","volume-title":"Modelling and Analysis of Security Protocols: The CSP Approach","author":"P.Y.A. Ryan","year":"2001","unstructured":"Ryan, P.Y.A., Schneider, S.A.: Modelling and Analysis of Security Protocols: The CSP Approach. Addison-Wesley, Reading (2001)"}],"container-title":["Lecture Notes in Computer Science","Web Services and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11841197_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T20:24:29Z","timestamp":1736540669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11841197_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540388623","9783540388654"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11841197_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}