{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:39:38Z","timestamp":1725493178530},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405399"},{"type":"electronic","value":"9783540450757"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45075-0_18","type":"book-chapter","created":{"date-parts":[[2007,10,27]],"date-time":"2007-10-27T17:49:12Z","timestamp":1193507352000},"page":"300-316","source":"Crossref","is-referenced-by-count":0,"title":["Applying SDL to Formal Analysis of Security Systems"],"prefix":"10.1007","author":[{"given":"Javier","family":"L\u00f3pez","sequence":"first","affiliation":[]},{"given":"Juan J.","family":"Ortega","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 M.","family":"Troya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"C. Meadows. Open issues in formal methods for cryptographic protocol analysis. Proceedings of DISCEX 2000, pages 237\u2013250. IEEE Comp. Society Press, 2000.","DOI":"10.21236\/ADA385327"},{"issue":"1871","key":"18_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"M. Burrows, M. Abadi, R. Needham. A logic of authentication. In Proceedings of the Royal Society, Series A, 426(1871):233\u2013271, 1989.","journal-title":"Proceedings of the Royal Society"},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/BFb0028774","volume-title":"CAV 98 Computer-aided Verification","author":"R. Alur","year":"1998","unstructured":"R. Alur, T. Henzinger, F. Mang, S. Qadeer, S. Rajamani, S. Tasiran. Mocha: modularity in model checking. CAV 98 Computer-aided Verification, Lecture Notes in Computer Science 1427, pages 521\u2013525. Springer-Verlag, 1998."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"W. Marrero, E. Clarke, S. Jha. Model checking for security protocols. DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997.","DOI":"10.21236\/ADA327281"},{"key":"18_CR5","unstructured":"J. C. Mitchell, M. Mitchell, U. Stern. Automated analysis of cryptographic protocols using Murphi. In Proceedings of IEEE Symposium on Security and Privacy, pages 141\u2013151. IEEE Computer Society Press, 1997."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6, 1998.","DOI":"10.3233\/JCS-1998-61-205"},{"key":"18_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Infrasec\u201902","author":"J. L\u00f3pez","year":"2002","unstructured":"J. L\u00f3pez, J. J. Ortega, J. M. Troya. Protocol Engineering Applied to Formal Analysis of Security Systems. Infrasec\u201902, LNCS 2437, Bristol, UK, October 2002."},{"key":"18_CR8","unstructured":"J. L\u00f3pez, J. J. Ortega, J. M. Troya. Verification of authentication protocols using SDL-Method. Workshop of Information Security, Ciudad-Real-SPAIN, April 2002."},{"key":"18_CR9","unstructured":"ITU-T Recommendation Z.100 (11\/99). Specification and Description Language (SDL), Geneva, 1999."},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"IT-29","author":"D. Dolev","year":"1983","unstructured":"D. Dolev, A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29:198\u2013208, 1983.","journal-title":"IEEE Transactions on Information Theory"},{"key":"18_CR11","unstructured":"ITU-T, Recommendation Z.120(10\/96). Message Sequence Charts (MSC). Geneva, 1996."},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"A. Menezes, P. C. Van Oorschot, S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"18_CR13","unstructured":"CCITT Recommendation X.800. Security Architecture for Open Systems Interconnection for CCITT Applications. 1991."},{"key":"18_CR14","unstructured":"ITU-T Recommendation X.810 (ISO\/IEC 10181-1). Information Technology \u2014 Open Systems Interconnection \u2014 Security Frameworks for Open Systems \u2014 Overview. 1995."},{"key":"18_CR15","unstructured":"ITU-T Recommendation X.811 (ISO\/IEC 10181-2). Information Technology \u2014 Open Systems Interconnection \u2014 Security Frameworks for Open Systems \u2014 Authentication. 1995."},{"key":"18_CR16","unstructured":"ITU-T Recommendation X.812 (ISO\/IEC 10181-3). Information Technology \u2014 Open Systems Interconnection \u2014 Security Frameworks for Open Systems \u2014 Access Control. 1995."},{"key":"18_CR17","unstructured":"ITU-T Recommendation X.813 (ISO\/IEC 10181-4). Information Technology \u2014 Open Systems Interconnection \u2014 Security Frameworks for Open Systems \u2014 Non-Repudiation. 1995."},{"key":"18_CR18","unstructured":"ITU-T Recommendation X.814 (ISO\/IEC 10181-5). Information Technology \u2014 Open Systems Interconnection \u2014 Security Frameworks for Open Systems \u2014 Confidentiality. 1995."},{"key":"18_CR19","unstructured":"ITU-T Recommendation X.815 (ISO\/IEC 10181-6). Information Technology \u2014 Open Systems Interconnection \u2014 Security Frameworks for Open Systems \u2014 Integrity. 1995."},{"key":"18_CR20","unstructured":"P. Ryan, S. Schneider. The Modelling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley, 2001."},{"key":"18_CR21","unstructured":"ITU-T, Recommendation Z.120 (11\/99). Message Sequence Charts (MSC-2000). Geneva, 1999."},{"key":"18_CR22","unstructured":"RSA Laboratory. Public-Key Cryptography Standards (PKCS), http:\/\/www.rsa.com\/ ."},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"G. Lowe. Towards a Completeness Result for Model Checking of Security Protocols. 11th IEEE Computer Security Foundations Workshop, pages 96\u2013105. IEEE Computer Society, 1998.","DOI":"10.1109\/CSFW.1998.683159"},{"key":"18_CR24","unstructured":"M. Rusinowich, M. Turuani. Protocol Insecurity with Finite Number of Sessions is NP-complete. 14th IEEE Computer Security Foundations Workshop June 11\u201313, 2001."},{"key":"18_CR25","unstructured":"Solinet GmbH. SAFIRE product, http:\/\/www.solinet.com\/"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"S. M. Bellovin, M. Merrit. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 72\u201384, 1992.","DOI":"10.1109\/RISP.1992.213269"}],"container-title":["Lecture Notes in Computer Science","SDL 2003: System Design"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45075-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T22:17:40Z","timestamp":1556921860000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45075-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405399","9783540450757"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-45075-0_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}