{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:52:14Z","timestamp":1725558734749},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208303"},{"type":"electronic","value":"9783540398714"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39871-4_10","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T19:33:06Z","timestamp":1277839986000},"page":"104-119","source":"Crossref","is-referenced-by-count":5,"title":["Confidentiality Levels and Deliberate\/Indeliberate Protocol Attacks"],"prefix":"10.1007","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Bistarelli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Bella, G., Bistarelli, S.: Protocol Analysis using Soft Constraints. Invited talk at S.R.I. Security group, Menlo Park, USA (February 2001)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/3-540-45241-9_8","volume-title":"Practical Aspects of Declarative Languages","author":"G. Bella","year":"2001","unstructured":"Bella, G., Bistarelli, S.: Soft Constraints for Security Protocol Analysis: Confidentiality. In: Ramakrishnan, I.V. (ed.) PADL 2001. LNCS, vol.\u00a01990, pp. 108\u2013122. Springer, Heidelberg (2001)"},{"key":"10_CR3","volume-title":"Proc. ACM Symposium on Applied Computing (SAC)","author":"S. Bistarelli","year":"2002","unstructured":"Bistarelli, S., Fruewirth, T., Marte, M., Rossi, F.: Soft Constraint Propagation and Solving in CHR. In: Proc. ACM Symposium on Applied Computing (SAC), Madrid, Spain. ACM, New York (March 2002)"},{"issue":"2","key":"10_CR4","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/256303.256306","volume":"44","author":"S. Bistarelli","year":"1997","unstructured":"Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based Constraint Solving and Optimization. Journal of the ACM\u00a044(2), 201\u2013236 (1997)","journal-title":"Journal of the ACM"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/383721.383725","volume":"23","author":"S. Bistarelli","year":"2001","unstructured":"Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based Constraint Logic Programming: Syntax and Semantics. ACM Transactions on Programming Languages and System (TOPLAS)\u00a023, 1\u201329 (2001)","journal-title":"ACM Transactions on Programming Languages and System (TOPLAS)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Cervesato, I., Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: A Meta-Notation for Protocol Analysis. In: Proc. CSFW, pp. 55\u201369 (1999)","DOI":"10.1109\/CSFW.1999.779762"},{"issue":"5","key":"10_CR7","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A Lattice Model of Secure Information Flow. Comm. of ACM\u00a019(5), 236\u2013242 (1976)","journal-title":"Comm. of ACM"},{"key":"10_CR8","first-page":"1131","volume-title":"Proc. of IEEE International Conference on Fuzzy Systems","author":"D. Dubois","year":"1993","unstructured":"Dubois, D., Fargier, H., Prade, H.: The Calculus of Fuzzy Restrictions as a Basis for Flexible Constraint Satisfaction. In: Proc. of IEEE International Conference on Fuzzy Systems, pp. 1131\u20131136. IEEE Press, Los Alamitos (1993)"},{"key":"10_CR9","unstructured":"Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Undecidability of Bounded Security Protocols. In: Heintze, N., Clarke, E. (eds.) Proc. FMSP 1999 (1999)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Freuder, E.C., Wallace, R.J.: Partial Constraint Satisfaction. AI Journal (1992)","DOI":"10.1016\/0004-3702(92)90004-H"},{"key":"10_CR11","unstructured":"Gray, E.: American national standard t1.523-2001, telecom glossary 2000 (2001), published on the Web at http:\/\/www.its.bldrdoc.gov\/projects\/telecomglossary2000"},{"issue":"3","key":"10_CR12","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters\u00a056(3), 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/0004-3702(77)90007-8","volume":"8","author":"A.K. Mackworth","year":"1977","unstructured":"Mackworth, A.K.: Consistency in Networks of Relations. Artificial Intelligence\u00a08(1), 99\u2013118 (1977)","journal-title":"Artificial Intelligence"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0020-0255(74)90008-5","volume":"7","author":"U. Montanari","year":"1971","unstructured":"Montanari, U.: Networks of Constraints: Fundamental Properties and Applications to Picture Processing. Information Science\u00a07, 95\u2013132 (1971); Also Technical Report, Carnegie Mellon University (1971)","journal-title":"Information Science"},{"key":"10_CR15","volume-title":"Practical Cryptography for Data Internetworks","author":"B.C. Neuman","year":"1996","unstructured":"Neuman, B.C., Ts\u2019o, T.: Kerberos: An Authentication Service for Computer Networks, from IEEE Communications Magazine, September, 1994. In: Stallings, W. (ed.) Practical Cryptography for Data Internetworks. IEEE Press, Los Alamitos (1996)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Ruttkay, Z.: Fuzzy Constraint Satisfaction. In: Proc. of 3rd IEEE International Conference on Fuzzy Systems, pp. 1263\u20131268 (1994)","DOI":"10.1109\/FUZZY.1994.343640"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Schiex, T.: Possibilistic Constraint Satisfaction Problems, or How to Handle Soft Constraints? In: Proc. of 8th Conference on Uncertainty in AI, pp. 269\u2013275 (1992)","DOI":"10.1016\/B978-1-4832-8287-9.50041-4"},{"key":"10_CR18","first-page":"631","volume-title":"Proc. of the 14th International Joint Conference on Artificial Intelligence (IJCAI 1995)","author":"T. Schiex","year":"1995","unstructured":"Schiex, T., Fargier, H., Verfaille, G.: Valued Constraint Satisfaction Problems: Hard and Easy Problems. In: Proc. of the 14th International Joint Conference on Artificial Intelligence (IJCAI 1995), pp. 631\u2013637. Morgan Kaufmann, San Francisco (1995)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39871-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:00:31Z","timestamp":1559228431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39871-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208303","9783540398714"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39871-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}