{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T05:21:38Z","timestamp":1737091298137,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540431664"},{"type":"electronic","value":"9783540456483"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45648-1_17","type":"book-chapter","created":{"date-parts":[[2007,5,28]],"date-time":"2007-05-28T05:26:02Z","timestamp":1180329962000},"page":"330-349","source":"Crossref","is-referenced-by-count":4,"title":["A Formal Analysis of the CORBA Security Service"],"prefix":"10.1007","author":[{"given":"David","family":"Basin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frank","family":"Rittinger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luca","family":"Vigan\u00f3","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2002,1,22]]},"reference":[{"key":"17_CR1","unstructured":"J. Arndt and T. \u00d6sterdahl. Network security in distributed systems using CORBA. Technical report, Ericsson Hewlett-Packard Telecommunications AB, 1998."},{"key":"17_CR2","unstructured":"B. Blakley. CORBA Security. Addison-Wesley-Longman, 1999."},{"key":"17_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/10722599_6","volume-title":"A Typed Access Control Model for CORBA","author":"G. Brose","year":"2000","unstructured":"G. Brose. A Typed Access Control Model for CORBA. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Proceedings of ESORICS 2000, LNCS 1895, pages 88\u2013105. Springer-Verlag, 2000."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"G. Duval. Specification and veri.cation of an object request broker. In Proceedings of the 20th International Conference on Software Engineering (ICSE\u201998), pages 43\u201352. IEEE Computer Society Press, 1998.","DOI":"10.1109\/ICSE.1998.671101"},{"key":"17_CR5","unstructured":"D. Gollmann. Computer security. John Wiley & Sons, 1999."},{"key":"17_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/3-540-52513-0_16","volume-title":"Using Z as a speci.cation calculus for object oriented systems","author":"J. Hall","year":"1990","unstructured":"J. Hall. Using Z as a speci.cation calculus for object oriented systems. In D. Bjorner, C. A. R. Hoare, and H. Langmaack, editors, Proceedings of VDM\u201990, LNCS 428, pages 290\u2013318. Springer-Verlag, 1990."},{"key":"17_CR7","unstructured":"I. Hayes. Specification Case Studies. Prentice-Hall International, 1993."},{"key":"17_CR8","unstructured":"D. Jackson and J. Wing. Lightweight formal methods. IEEE Computer, 1996."},{"key":"17_CR9","unstructured":"J. Jacky. The way of Z. Cambridge University Press, 1997."},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/s100090050045","volume":"2","author":"M. Kamel","year":"2000","unstructured":"M. Kamel and S. Leue. Formalization and Validation of the General Inter-ORB Protocol (GIOP) using Promela and Spin. Software Tools for Technology Transfer, 2:394\u2013409, 2000.","journal-title":"Software Tools for Technology Transfer"},{"issue":"2","key":"17_CR11","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3233\/JCS-2000-82-302","volume":"8","author":"G. Karjoth","year":"2000","unstructured":"G. Karjoth. Authorization in CORBA Security. Journal of Computer Security, 8(2\u20133):89\u2013108, 2000.","journal-title":"Journal of Computer Security"},{"key":"17_CR12","series-title":"Lect Notes Comput Sci","first-page":"283","volume-title":"A structure preserving encoding of Z in Isabelle\/ HOL","author":"K. T. Santen","year":"1996","unstructured":"Kolyang, T. Santen, and B. Wolff. A structure preserving encoding of Z in Isabelle\/ HOL. In J. von Wright, J. Grundy, and J. Harrison, editors, Proceedings of TPHOLs\u201996, LNCS 1125, pages 283\u2013298. Springer-Verlag, 1996."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"D. Kreuz. Formal specification of CORBA services using Object-Z. In Proceedings of 2nd IEEE International Conference on Formal Engineering Methods (ICFEM\u201998). IEEE Computer Society Press, 1998.","DOI":"10.1109\/ICFEM.1998.730582"},{"key":"17_CR14","unstructured":"D. Kreuz. Formale Semantik von Konnektoren. PhD thesis, Technische Universit\u00e4t Hamburg-Harburg, Germany, 1999. In German."},{"key":"17_CR15","unstructured":"U. Lang. CORBA Security. Master\u2019s thesis, Royal Holloway University of London, 1997."},{"key":"17_CR16","unstructured":"OMG. http:\/\/www.omg.org ."},{"key":"17_CR17","unstructured":"OMG. CORBA\/IIOP 2.2. OMG, 1998."},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"OMG Security Working Group. CORBAservices Security Service Specification v1.2. Technical report, Document: formal\/98-12-17, OMG, 1998.","DOI":"10.1016\/S0167-4048(98)80010-1"},{"key":"17_CR19","unstructured":"R. Orfali, D. Harkey, and J. Edwards. Instant CORBA. Addison-Wesley-Longman, 1998."},{"key":"17_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0030541","volume-title":"Isabelle: a generic theorem prover","author":"L. C. Paulson","year":"1994","unstructured":"L. C. Paulson. Isabelle: a generic theorem prover. LNCS 828. Springer-Verlag, 1994."},{"key":"17_CR21","unstructured":"D. Platt. Understanding COM+. Microsoft Press, 1999."},{"key":"17_CR22","unstructured":"A. Pope. The CORBA Reference Guide. Addison-Wesley-Longman, 1998."},{"key":"17_CR23","unstructured":"J.-C. Real. Object-Z speci.cation of the CORBA repository service. Technical Report 351, Universit\u00e9 Libre de Bruxelles, 1997."},{"key":"17_CR24","unstructured":"F. Rittinger. Formale Analyse des CORBA Sicherheitsdienstes. Diplomarbeit, Institut f\u00fcr Informatik, Albert-Ludwigs-Universit\u00e4t Freiburg, Germany, 2000. In German."},{"key":"17_CR25","unstructured":"A. Roscoe. The Theory and Practice of Concurrency. Prentice Hall International, 1997."},{"key":"17_CR26","unstructured":"G. Seshadri. Enterprise Java Computing. Cambridge University Press, 1999."},{"key":"17_CR27","unstructured":"G. Smith. The Object-Z Specification Language. Kluwer Academic Publishers, 1999."},{"key":"17_CR28","unstructured":"J. Spivey. The Z Notation: A Reference Manual. Prentice Hall International, 2nd edition, 1992."},{"key":"17_CR29","unstructured":"S. Stepney. Object Orientation in Z. Springer-Verlag, 1990."},{"key":"17_CR30","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/3-540-63533-5_17","volume-title":"A corrected failure-divergence model for CSP in Isabelle\/HOL","author":"H. Tej","year":"1997","unstructured":"H. Tej and B. Wolff. A corrected failure-divergence model for CSP in Isabelle\/HOL. In J. Fitzgerald, C. Jones, and P. Lucas, editors, Proceedings of FME\u201997, LNCS 1313, pages 318\u2013337. Springer-Verlag, 1997."},{"key":"17_CR31","unstructured":"J. Woodcock and J. Davis. Using Z. Prentice Hall International, 1995."},{"key":"17_CR32","unstructured":"ZETA. http:\/\/uebb.cs.tu-berlin.de\/zeta\/ ."}],"container-title":["Lecture Notes in Computer Science","ZB 2002:Formal Specification and Development in Z and B"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45648-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:35:32Z","timestamp":1737052532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45648-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540431664","9783540456483"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/3-540-45648-1_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}