{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:40:03Z","timestamp":1747183203916,"version":"3.40.5"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319140537"},{"type":"electronic","value":"9783319140544"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14054-4_7","type":"book-chapter","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T03:39:19Z","timestamp":1418182759000},"page":"93-110","source":"Crossref","is-referenced-by-count":2,"title":["Security Goals and Evolving Standards"],"prefix":"10.1007","author":[{"given":"Joshua D.","family":"Guttman","sequence":"first","affiliation":[]},{"given":"Moses D.","family":"Liskov","sequence":"additional","affiliation":[]},{"given":"Paul D.","family":"Rowe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"7_CR1","doi-asserted-by":"crossref","first-page":"817","DOI":"10.3233\/JCS-130472","volume":"21","author":"D.A. Basin","year":"2013","unstructured":"Basin, D.A., Cremers, C., Meier, S.: Provably repairing the ISO\/IEC 9798 standard for entity authentication. Journal of Computer Security\u00a021(6), 817\u2013846 (2013)","journal-title":"Journal of Computer Security"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Pironti, A., Strub, P.-Y.: Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS. In: IEEE Symposium on Security and Privacy (2014)","DOI":"10.1109\/SP.2014.14"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems\u00a08, 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"2-4","key":"7_CR4","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.ic.2007.05.005","volume":"206","author":"I. Cervesato","year":"2008","unstructured":"Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J.-K., Walstad, C.: Breaking and fixing public-key Kerberos. Inf. Comput.\u00a0206(2-4), 402\u2013424 (2008)","journal-title":"Inf. Comput."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Cremers, C., Mauw, S.: Operational Semantics and Verification of Security Protocols. Springer (2012)","DOI":"10.1007\/978-3-540-78636-8"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.entcs.2007.02.012","volume":"172","author":"A. Datta","year":"2007","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol composition logic (PCL). Electr. Notes Theor. Comput. Sci.\u00a0172, 311\u2013358 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), Updated by RFCs 5746, 5878, 6176 (August 2008)","DOI":"10.17487\/rfc5246"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Dougherty, D.J., Guttman, J.D.: Decidability for lightweight Diffie-Hellman protocols. In: IEEE Symposium on Computer Security Foundations (2014)","DOI":"10.1109\/CSF.2014.23"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security\u00a012(2), 247\u2013311 (1999), Initial version appeared Workshop on Formal Methods and Security Protocols (1999)","DOI":"10.3233\/JCS-2004-12203"},{"key":"7_CR10","unstructured":"Guttman, J.D.: Shapes: Surveying crypto protocol runs. In: Cortier, V., Kremer, S. (eds.) Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series. IOS Press (2011)"},{"issue":"2","key":"7_CR11","doi-asserted-by":"crossref","first-page":"201","DOI":"10.3233\/JCS-140499","volume":"22","author":"J.D. Guttman","year":"2014","unstructured":"Guttman, J.D.: Establishing and preserving protocol security goals. Journal of Computer Security\u00a022(2), 201\u2013267 (2014)","journal-title":"Journal of Computer Security"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A hierarchy of authentication specification. In: CSFW, pp. 31\u201344 (1997)","DOI":"10.1109\/CSFW.1997.596782"},{"issue":"2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C.: The NRL protocol analyzer: An overview. The Journal of Logic Programming\u00a026(2), 113\u2013131 (1996)","journal-title":"The Journal of Logic Programming"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Meadows, C.: Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. In: IEEE Symposium on Security and Privacy, pp. 216\u2013231 (1999)","DOI":"10.21236\/ADA465466"},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/JSAC.2002.806125","volume":"21","author":"C. Meadows","year":"2003","unstructured":"Meadows, C.: Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communications\u00a021(1), 44\u201354 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-540-68914-0_19","volume-title":"Applied Cryptography and Network Security","author":"J.C. Mitchell","year":"2008","unstructured":"Mitchell, J.C., Roy, A., Rowe, P., Scedrov, A.: Analysis of EAP-GPSK authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 309\u2013327. Springer, Heidelberg (2008)"},{"key":"7_CR17","unstructured":"Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5). RFC 4120 (Proposed Standard), Updated by RFCs 4537, 5021, 5896, 6111, 6112, 6113, 6649, 6806 (July 2005)"},{"key":"7_CR18","unstructured":"Ramsdell, J.D., Guttman, J.D.: CPSA: A cryptographic protocol shapes analyzer (2009), http:\/\/hackage.haskell.org\/package\/cpsa"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Ray, M., Dispensa, S., Oskov, N.: Transport Layer Security (TLS) Renegotiation Indication Extension. RFC 5746 (Proposed Standard) (February 2010)","DOI":"10.17487\/rfc5746"},{"key":"7_CR20","unstructured":"Song, D.X.: Athena: A new efficient automated checker for security protocol analysis. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop. IEEE CS Press (June 1999)"},{"issue":"2\/3","key":"7_CR21","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"F.J. Thayer","year":"1999","unstructured":"Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security\u00a07(2\/3), 191\u2013230 (1999)","journal-title":"Journal of Computer Security"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Zhu, L., Tung, B.: Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC 4556 (Proposed Standard), Updated by RFC 6112 (June 2006)","DOI":"10.17487\/rfc4556"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14054-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:15:36Z","timestamp":1747181736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14054-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319140537","9783319140544"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14054-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}