{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:45Z","timestamp":1725488685216},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_33","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T14:02:07Z","timestamp":1186408927000},"page":"387-398","source":"Crossref","is-referenced-by-count":7,"title":["A Formal Approach to Security Architectures"],"prefix":"10.1007","author":[{"given":"Rainer A.","family":"Rueppel","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","series-title":"Tech. Report","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","volume-title":"Secure computer system: unified exposition and Multics interpretation","author":"D.E. Bell","year":"1976","unstructured":"D.E. Bell, L.J. LaPadula, \u201cSecure computer system: unified exposition and Multics interpretation\u201d, Tech. Report MTR-2997, Mitre Corp., Bedford, Mass., Mar. 1976."},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, R. Needham, \u201cA logic of authentication\u201d, Tech. Report 39, DEC Systems Research Center, 1989.","DOI":"10.1145\/74850.74852"},{"key":"33_CR3","first-page":"109","volume-title":"AFIPS Conference Proceedings Vol. 45: National Computer Conference","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M.E. Hellman, \u201cMultiuser cryptographic techniques,\u201d in S. Winkler, Ed., AFIPS Conference Proceedings Vol. 45: National Computer Conference, New York, NY, June 7\u201310, 1976, pp. 109\u2013112. Montvale, NJ: AFIPS Press, 1976."},{"issue":"6","key":"33_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M.E. Hellman, \u201cNew directions in cryptography,\u201d IEEE Transactions on Information Theory, Vol. IT-22, No. 6, November 1976, pp. 644\u2013654. key management scheme for implementing the Data Encryption Standard\u201d, IBM Systems Journal, Vol. 17, No. 2, 1978, pp. 106\u2013125.","journal-title":"IEEE Transactions on Information Theory"},{"key":"33_CR5","unstructured":"W. Fumy, M. Leclerc \u201cIntegrating key management protocols into the OSI architecture\u201d, Proc. of Symposium on Computer Security 90, Rome, Italy, Nov. 22\u201323, 1990."},{"key":"33_CR6","unstructured":"K. Gaarder, E. Snekkenes, \u201cApplying a formal analysis technique to the CCITT X.509 strong two-way protocol\u201d, to appear in JCrypt. Special Issue on Applications of Cryptology."},{"key":"33_CR7","unstructured":"ISO 7498-2, \u201cInformation processing systems \u2014 Open Systems Interconnect \u2014 Basic reference model \u2014 Part 2: Security Architecture\u201d, First Ed. 1989."},{"key":"33_CR8","unstructured":"IEC\/ISO JTC1\/SC27 Working Draft: \u201cKey management part 1: overview\u201d, 1990."},{"key":"33_CR9","unstructured":"IEC\/ISO JTC1\/SC27 Working Draft: \u201cKey management part 2: key management using symmetric cryptographic techniques\u201d, 1990."},{"key":"33_CR10","unstructured":"IEC\/ISO JTC1\/SC27 Working Draft: \u201cKey management part 3: key management using public key techniques\u201d, 1990."},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"R. Kemmerer, \u201cAnalyzing encryption protocols using formal verification techniques\u201d, Advances in Cryptology-Proc. of Crypto\u201987, Springer \u2014 Verlag, 1988.","DOI":"10.1007\/3-540-48184-2_26"},{"key":"33_CR12","volume-title":"A method for certification","author":"L.M. Kohnfelder","year":"1978","unstructured":"L.M. Kohnfelder, \u201cA method for certification,\u201d MIT Laboratory for Computer Science, Cambridge, MA May 1978."},{"key":"33_CR13","unstructured":"P. Landrock, W. Fumy, \u201cUser identification and key management using public key techniques\u201d, Proc. of Symposium on Computer Security 90, Rome, Italy, Nov. 22\u201323, 1990."},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"J. McLean, \u201cThe specification and modeling of computer security\u201d, IEEE Computer, Jan. 1990.","DOI":"10.21236\/ADA462368"},{"issue":"12","key":"33_CR15","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"R.M. Needham and M.D. Schroeder, \u201cUsing encryption for authentication in large networks of computers,\u201d Communications of the ACM, Vol. 21, No. 12, December 1978, pp. 993\u2013999.","journal-title":"Communications of the ACM"},{"issue":"2","key":"33_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, Communications of the ACM, Vol. 21, No. 2, February 1978, pp. 120\u2013127.","journal-title":"Communications of the ACM"},{"key":"33_CR17","unstructured":"R.A. Rueppel, \u201cKey agreements based on function composition\u201d, Advances in Cryptology: Proceedings Eurocrypt\u201988, Springer \u2014 Verlag, 1988."},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"R.A. Rueppel, \u201cSecurity management\u201d, Proc. of Symposium on Computer Security 90, Rome. Italy, Nov. 22\u201323, 1990.","DOI":"10.1016\/0142-0496(90)90116-3"},{"key":"33_CR19","unstructured":"A. Shamir, \u201cIdentity \u2014 based cryptosystems and signature schemes\u201d, Advances in Cryptology: Proceedings Crypto\u201984, Springer \u2014 Verlag, 1985."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:47:45Z","timestamp":1619556465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_33","relation":{},"subject":[]}}