{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:05:37Z","timestamp":1725516337526},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692072"},{"type":"electronic","value":"9783540692096"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69209-6_18","type":"book-chapter","created":{"date-parts":[[2008,8,11]],"date-time":"2008-08-11T13:20:59Z","timestamp":1218460859000},"page":"337-355","source":"Crossref","is-referenced-by-count":2,"title":["Modeling and Validation of Aviation Security"],"prefix":"10.1007","author":[{"given":"Uwe","family":"Gl\u00e4sser","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Rastkar","sequence":"additional","affiliation":[]},{"given":"Mona","family":"Vajihollahi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511624162","volume-title":"The B-Book: Assigning Programs to Meanings","author":"J.R. Abrial","year":"1996","unstructured":"Abrial, J.R.: The B-Book: Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Altenhofen, M., B\u00f6rger, E., Lemcke, J.: A High-Level Specification for Mediators (Virtual Providers). In: Bussler, C., Haller, A. (eds.) Proceedings of Business Process Management Workshops, pp. 116\u2013129 (2005)","DOI":"10.1007\/11678564_11"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"B\u00f6rger, E.: The ASM ground model method as a foundation for requirements engineering. J. Verification: Theory and Practice, 145\u2013160 (2003)","DOI":"10.1007\/978-3-540-39910-0_6"},{"key":"18_CR4","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-1-4615-2237-9_5","volume-title":"Formal Semantics for VHDL","author":"E. B\u00f6rger","year":"1995","unstructured":"B\u00f6rger, E., Gl\u00e4sser, U., M\u00fcller, W.: Formal Definition of an Abstract VHDL\u201993 Simulator by EA-Machines. In: Kloos, C.D., Breuer, P.T. (eds.) Formal Semantics for VHDL, pp. 107\u2013139. Kluwer Academic Publishers, Dordrecht (1995)"},{"key":"18_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-18216-7","volume-title":"Abstract State Machines: A Method for High-Level System Design and Analysis","author":"E. B\u00f6rger","year":"2003","unstructured":"B\u00f6rger, E., St\u00e4rk, R.: Abstract State Machines: A Method for High-Level System Design and Analysis. Springer, Heidelberg (2003)"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"3667","DOI":"10.1109\/ICSMC.2005.1571717","volume-title":"Proceedings of 2005 IEEE International Conference on Systems, Man and Cybernetics","author":"P.L. Brantingham","year":"2005","unstructured":"Brantingham, P.L., Kinney, B., Gl\u00e4sser, U., Singh, K., Vajihollahi, M.: A Computational Model for Simulating Spatial Aspects of Crime in Urban Environments. In: Jamshidi, M. (ed.) Proceedings of 2005 IEEE International Conference on Systems, Man and Cybernetics, pp. 3667\u20133674. IEEE, Los Alamitos (2005)"},{"key":"18_CR7","volume-title":"Model Checking","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (2000)"},{"issue":"8491","key":"18_CR8","first-page":"21","volume":"389","author":"The Economist Airport Screening Technology","year":"2006","unstructured":"The Economist Airport Screening Technology: Full Exposure. The Economist\u00a0389(8491), 21\u201321 (2006)","journal-title":"Full Exposure. The Economist"},{"key":"18_CR9","unstructured":"Farahbod, R., et al.: The CoreASM Project, http:\/\/www.coreasm.org"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Farahbod, R., Gl\u00e4sser, U., Vajihollahi, M.: An Abstract Machine Architecture for Web Service Based Business Process Management. The special issue on Business Processes and Services of the International Journal of Business Process Integration and Management (IJBPIM) (to appear, 2006)","DOI":"10.1504\/IJBPIM.2006.012626"},{"key":"18_CR11","unstructured":"The fifth estate, Fasten Your Seatbelts. First aired Nov 9, 2005 on CBC-TV (2006) Last visited November 2006, http:\/\/www.cbc.ca\/fifth\/fastenseatbelts\/index.html"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Gatersleben, M.R., van der Weij, S.W.: Analysis and Simulation of Passenger Flows in an Airport Terminal. In: Farrington, P.A., Nembhard, H.B., Evans, G.W. (eds.) Proceedings of the 1999 Winter Simulation Conference, pp. 1226\u20131231 (1999)","DOI":"10.1145\/324898.325045"},{"issue":"3","key":"18_CR13","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/S1389-1286(03)00247-0","volume":"42","author":"U. Gl\u00e4sser","year":"2003","unstructured":"Gl\u00e4sser, U., Gotzhein, R., Prinz, A.: The formal semantics of SDL-2000: status and perspectives. J. Comput. Networks\u00a042(3), 343\u2013358 (2003)","journal-title":"J. Comput. Networks"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11760146_37","volume-title":"Intelligence and Security Informatics","author":"U. Gl\u00e4sser","year":"2006","unstructured":"Gl\u00e4sser, U., Rastkar, S., Vajihollahi, M.: Computational Modeling and Experimental Validation of Aviation Security Procedures. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol.\u00a03975, pp. 420\u2013432. Springer, Heidelberg (2006)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Gl\u00e4sser, U., Rastkar, S., Vajihollahi, M.: Computational Modeling and Experimental Validation of Aviation Security Procedures. Technical Report SFU-CMPT-TR-2006-23. Simon Fraser University (2006)","DOI":"10.1007\/11760146_37"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11691372_29","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Hinton","year":"2006","unstructured":"Hinton, A., Kwiatkowska, M., Norman, G., Parker, D.: Prism: A tool for automatic verification of probabilistic systems. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006 and ETAPS 2006. LNCS, vol.\u00a03920, pp. 441\u2013444. Springer, Heidelberg (2006)"},{"key":"18_CR17","unstructured":"International Civil Aviation Organization (ICAO), Annex 17 to the Convention on International Civil Aviation: Standards and Recommended Practices - Security - Safeguarding International Civil Aviation against Acts of Unlawful Interference (2002)"},{"issue":"4","key":"18_CR18","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1059816.1059820","volume":"32","author":"M. Kwiatkowska","year":"2005","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: Probabilistic model checking in practice: Case studies with PRISM. J. ACM SIGMETRICS Performance Evaluation Review\u00a032(4), 16\u201321 (2005)","journal-title":"J. ACM SIGMETRICS Performance Evaluation Review"},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10703-006-0005-2","volume":"29","author":"M. Kwiatkowska","year":"2006","unstructured":"Kwiatkowska, M., Norman, G., Parker, D., Sproston, J.: Performance analysis of probabilistic timed automata using digital clocks. J. Formal Methods in System Design\u00a029, 33\u201378 (2006)","journal-title":"J. Formal Methods in System Design"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/S0304-3975(01)00046-9","volume":"282","author":"M. Kwiatkowska","year":"2002","unstructured":"Kwiatkowska, M., Norman, G., Segala, R., Sproston, J.: Automatic verification of real-time systems with discrete probability distributions. J. Theoretical Computer Science\u00a0282, 101\u2013150 (2002)","journal-title":"J. Theoretical Computer Science"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/3-540-45605-8_11","volume-title":"Process Algebra and Probabilistic Methods. Performance Modeling and Verification","author":"M. Kwiatkowska","year":"2002","unstructured":"Kwiatkowska, M., Norman, G., Sproston, J.: Probabilistic model checking of the IEEE 802.11 wireless local area network protocol. In: Hermanns, H., Segala, R. (eds.) PROBMIV 2002, PAPM-PROBMIV 2002, and PAPM 2002. LNCS, vol.\u00a02399, pp. 169\u2013187. Springer, Heidelberg (2002)"},{"issue":"3","key":"18_CR22","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s001650300007","volume":"14","author":"M. Kwiatkowska","year":"2003","unstructured":"Kwiatkowska, M., Norman, G., Sproston, J.: Probabilistic model checking of deadline properties in the IEEE 1394 FireWire root contention protocol. J. Formal Aspects of Computing\u00a014(3), 295\u2013318 (2003)","journal-title":"J. Formal Aspects of Computing"},{"key":"18_CR23","unstructured":"Laleau, R., Vignes, S., Ledru, Y., Lemoine, M., Bert, D., Donzeau-Gouge, V., Dubois, C., Peureux, F.: Application of Requirements Analysis Techniques to the Analysis of Civil Aviation Security Standards. In: Ralyt\u00e9, J., \u00c5gerfalk, P.J., Kraiem, N. (eds.) Proceedings of the First International Workshop on Situational Requirements Engineering Processes (SREP 2005), pp. 91\u2013107 (2006)"},{"key":"18_CR24","unstructured":"Ledru, Y.: Project EDEMOI - An Approach to Model and Validate Airport Security. (Final report) (2006)"},{"key":"18_CR25","unstructured":"Microsoft FSE Group, The Abstract State Machine Language (2003), http:\/\/research.microsoft.com\/fse\/asml\/"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Pendergraft, D.R., Robertson, C.V., Shrader, S.: Simulation of an Airport Passenger Security System. In: Ingalls, R.G., Rossetti, M.D., Smith, J.S., Peters, B.A. (eds.) Proceedings of the 2004 Winter Simulation Conference, pp. 874\u2013878 (2004)","DOI":"10.1109\/WSC.2004.1371402"},{"key":"18_CR27","unstructured":"PRISM Web Site, http:\/\/www.cs.bham.ac.uk\/~dxp\/prism"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Rutten, J., Kwiatkowska, M., Norman, G., Parker, D.: Mathematical Techniques for Analyzing Concurrent and Probabilistic Systems. In: Panangaden, P., van Breugel, F. (eds.). CRM Monograph Series, vol.\u00a023. American Mathematical Society (2004)","DOI":"10.1090\/crmm\/023"},{"key":"18_CR29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-59495-3","volume-title":"Java and Java Virtual Machine: Definition, Verification, Validation","author":"R. St\u00e4rk","year":"2001","unstructured":"St\u00e4rk, R., Schmid, J., B\u00f6rger, E.: Java and Java Virtual Machine: Definition, Verification, Validation. Springer, Heidelberg (2001)"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Takakuwa, S., Oyama, T.: Simulation Analysis of International-Departure Passenger Flows in an Airport Terminal. In: Chick, S., Sanchez, P.J., Ferrin, D., Morrice, D.J. (eds.) Proceedings of the 2003 Winter Simulation Conference (2003)","DOI":"10.1109\/WSC.2003.1261612"},{"key":"18_CR31","unstructured":"The European Parliament and the Council of the European Union, Regulation (EC) No 2320\/2002 of the European Parliament and of the Council - Establishing Common Rules in the Field of Civil Aviation Security (2002)"},{"issue":"8","key":"18_CR32","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/MAES.2005.1499286","volume":"20","author":"D.L. Wilson","year":"2005","unstructured":"Wilson, D.L.: Use of Modeling and Simulation to Support Airport Security. IEEE\u00a0Aerospace and Electronic Systems Magazine\u00a020(8), 3\u20136 (2005)","journal-title":"IEEE\u00a0Aerospace and Electronic Systems Magazine"}],"container-title":["Studies in Computational Intelligence","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69209-6_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:32:24Z","timestamp":1605763944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69209-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692072","9783540692096"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69209-6_18","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[]}}