{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:54:59Z","timestamp":1755035699095,"version":"3.41.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271514"},{"type":"electronic","value":"9783319271521"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27152-1_13","type":"book-chapter","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T04:55:10Z","timestamp":1449636910000},"page":"246-265","source":"Crossref","is-referenced-by-count":3,"title":["Formal Support for Standardizing Protocols with State"],"prefix":"10.1007","author":[{"given":"Joshua D.","family":"Guttman","sequence":"first","affiliation":[]},{"given":"Moses D.","family":"Liskov","sequence":"additional","affiliation":[]},{"given":"John D.","family":"Ramsdell","sequence":"additional","affiliation":[]},{"given":"Paul D.","family":"Rowe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1145\/1044731.1044735","volume":"52","author":"M Abadi","year":"2005","unstructured":"Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. J. ACM 52(1), 102\u2013146 (2005)","journal-title":"J. ACM"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Arapinis, M., Ritter, E., Ryan, M.D.: Statverif: verification of stateful processes. In: Computer Security Foundations Symposium (CSF), pp. 33\u201347. IEEE (2011)","DOI":"10.1109\/CSF.2011.10"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Arapinis, M., Ryan, M., Ritter, E.: StatVerif: verification of stateful processes. In: IEEE Symposium on Computer Security Foundations. IEEE CS Press, June 2011","DOI":"10.1109\/CSF.2011.10"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient protocol verifier based on Prolog rules. In: 14th Computer Security Foundations Workshop, pp. 82\u201396. IEEE CS Press, June 2001","DOI":"10.1109\/CSFW.2001.930138"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1007\/978-3-540-71209-1_42","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"V Cortier","year":"2007","unstructured":"Cortier, V., Keighren, G., Steel, G.: Automatic analysis of the security of XOR-based key management schemes. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 538\u2013552. Springer, Heidelberg (2007)"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/978-3-642-04444-1_37","volume-title":"Computer Security \u2013 ESORICS 2009","author":"V Cortier","year":"2009","unstructured":"Cortier, V., Steel, G.: A generic security API for symmetric key management on cryptographic devices. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 605\u2013620. Springer, Heidelberg (2009)"},{"issue":"3","key":"13_CR7","doi-asserted-by":"publisher","first-page":"423","DOI":"10.3233\/JCS-2005-13304","volume":"13","author":"A Datta","year":"2005","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3), 423\u2013482 (2005)","journal-title":"J. Comput. Secur."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Datta, A., Franklin, J., Garg, D., Kaynar, D.: A logic of secure systems and its application to trusted computing. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 221\u2013236. IEEE (2009)","DOI":"10.1109\/SP.2009.16"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Composition of password-based protocols. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF\u201908), pp. 239\u2013251. IEEE Computer Society Press, June 2008","DOI":"10.1109\/CSF.2008.6"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-19751-2_8","volume-title":"Formal Aspects of Security and Trust","author":"S Delaune","year":"2011","unstructured":"Delaune, S., Kremer, S., Ryan, M.D., Steel, G.: A formal analysis of authentication in the TPM. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 111\u2013125. Springer, Heidelberg (2011)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Delaune, S., Kremer, S., Ryan, M.D., Steel, G.: Formal analysis of protocols based on TPM state registers. In: IEEE Symposium on Computer Security Foundations. IEEE CS Press, June 2011","DOI":"10.1109\/CSF.2011.12"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-642-19751-2_7","volume-title":"Formal Aspects of Security and Trust","author":"S Fr\u00f6schle","year":"2011","unstructured":"Fr\u00f6schle, S., Sommer, N.: Reasoning with past to prove PKCS#11 keys secure. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 96\u2013110. Springer, Heidelberg (2011)"},{"key":"13_CR13","series-title":"lecture notes in computer science","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/978-3-540-74835-9_29","volume-title":"Computer Security \u2013 ESORICS 2007","author":"S G\u00fcrgens","year":"2007","unstructured":"G\u00fcrgens, S., Rudolph, C., Scheuermann, D., Atts, M., Plaga, R.: Security evaluation of scenarios based on the TCG\u2019s TPM specification. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 438\u2013453. Springer, Heidelberg (2007)"},{"key":"13_CR14","unstructured":"Guttman, J.D.: Shapes: surveying crypto protocol runs. In: Cortier, V., Kremer, S. (eds.) Formal Models and Techniques for Analyzing Security Protocols, Cryptology and Information Security Series. IOS Press (2011)"},{"issue":"2","key":"13_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s10817-010-9202-1","volume":"48","author":"JD Guttman","year":"2012","unstructured":"Guttman, J.D.: State and progress in strand spaces: proving fair exchange. J. Autom. reasoning 48(2), 159\u2013195 (2012)","journal-title":"J. Autom. reasoning"},{"issue":"2","key":"13_CR16","doi-asserted-by":"publisher","first-page":"201","DOI":"10.3233\/JCS-140497","volume":"22","author":"JD Guttman","year":"2014","unstructured":"Guttman, J.D.: Establishing and preserving protocol security goals. J. Comput. Secur. 22(2), 201\u2013267 (2014)","journal-title":"J. Comput. Secur."},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Guttman, J.D., Liskov, M.D., Ramsdell, J.D., Rowe, P.D.: Formal support for standardizing protocols with state (extended version). Arxiv, September 2015. http:\/\/arxiv.org\/abs\/1509.07552","DOI":"10.1007\/978-3-319-27152-1_13"},{"issue":"4","key":"13_CR18","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2006.85","volume":"4","author":"J Herzog","year":"2006","unstructured":"Herzog, J.: Applying protocol analysis to security device interfaces. IEEE Secur. Priv. 4(4), 84\u201387 (2006)","journal-title":"IEEE Secur. Priv."},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Kremer, S., K\u00fcnnemann, R.: Automated analysis of security protocols with global state. In: IEEE Symposium on Security and Privacy, pp. 163\u2013178 (2014)","DOI":"10.1109\/SP.2014.18"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-642-39799-8_48","volume-title":"Computer Aided Verification","author":"S Meier","year":"2013","unstructured":"Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696\u2013701. Springer, Heidelberg (2013)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"M\u00f6dersheim, S.: Abstraction by set-membership: verifying security protocols and web services with databases. In: ACM Conference on Computer and Communications Security, pp. 351\u2013360 (2010)","DOI":"10.1145\/1866307.1866348"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1007\/3-540-55602-8_217","volume-title":"Automated Deduction - CADE-11","author":"S Owre","year":"1992","unstructured":"Owre, S., Rushby, J.M., Shankar, N.: PVS: a prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 748\u2013752. Springer, Heidelberg (1992). http:\/\/pvs.csl.sri.com"},{"key":"13_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/978-3-319-10181-1_17","volume-title":"Integrated Formal Methods","author":"JD Ramsdell","year":"2014","unstructured":"Ramsdell, J.D., Dougherty, D.J., Guttman, J.D., Rowe, P.D.: A hybrid analysis for security protocols with state. In: Albert, E., Sekerinski, E. (eds.) IFM 2014. LNCS, vol. 8739, pp. 272\u2013287. Springer, Heidelberg (2014)"},{"key":"13_CR24","unstructured":"Ramsdell, J.D., Guttman, J.D.: CPSA: A cryptographic protocol shapes analyzer (2009). http:\/\/hackage.haskell.org\/package\/cpsa"},{"key":"13_CR25","unstructured":"Ramsdell, J.D., Guttman, J.D., Millen, J.K., O\u2019Hanlon, B.: An analysis of the CAVES attestation protocol using CPSA. MITRE Technical report MTR090213, The MITRE Corporation, December 2009. http:\/\/arxiv.org\/abs\/1207.0418"},{"key":"13_CR26","unstructured":"Rowe, P.D., Guttman, J.D., Liskov, M.D.: Measuring protocol strength with security goals. Submitted to IJIS in the SSR 2014 special issue, April 2015. http:\/\/web.cs.wpi.edu\/~guttman\/pubs\/ijis_measuring-security.pdf"},{"issue":"2\/3","key":"13_CR27","doi-asserted-by":"publisher","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"FJ Thayer","year":"1999","unstructured":"Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: proving security protocols correct. J. Comput. Secur. 7(2\/3), 191\u2013230 (1999)","journal-title":"J. Comput. Secur."},{"key":"13_CR28","unstructured":"Youn, P., Adida, B., Bond, M., Clulow, J., Herzog, J., Lin, A., Rivest, R., Anderson, R.: Robbing the bank with a theorem prover. In: Security Protocols Workshop (2007). http:\/\/www.cl.cam.ac.uk\/techreports\/UCAM-CL-TR-644.pdf"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27152-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T18:05:18Z","timestamp":1748714718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27152-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271514","9783319271521"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27152-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}