{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T20:55:13Z","timestamp":1757451313326,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749738"},{"type":"electronic","value":"9783540749745"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-540-93851-4_21","type":"book-chapter","created":{"date-parts":[[2009,1,13]],"date-time":"2009-01-13T02:18:17Z","timestamp":1231813097000},"page":"212-223","source":"Crossref","is-referenced-by-count":4,"title":["Goal-Equivalent Secure Business Process Re-engineering"],"prefix":"10.1007","author":[{"given":"Hugo A.","family":"L\u00f3pez","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Crazzolara, F.: Language, Semantics, and Methods for Security Protocols. Doctoral dissertation, BRICS, daimi. PhD thesis. xii+160 (May 2003)"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"F. Javier","year":"1999","unstructured":"Javier, F., Fabrega, T., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security\u00a07, 191\u2013230 (1999)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"21_CR3","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/357980.358021","volume":"26","author":"C.A.R. Hoare","year":"1983","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Commun. ACM\u00a026(1), 100\u2013106 (1983)","journal-title":"Commun. ACM"},{"key":"21_CR4","volume-title":"Business Process Reengineering\u2013Breakpoint Strategies for Market Dominance","author":"H.J. Johansson","year":"1993","unstructured":"Johansson, H.J., McHugh, P., Pendlebury, A.J., Wheeler, W.A.: Business Process Reengineering\u2013Breakpoint Strategies for Market Dominance. John Wiley & Sons, Chichester (1993)"},{"issue":"1\u20132","key":"21_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","volume":"6","author":"G. Lowe","year":"1998","unstructured":"Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security\u00a06(1\u20132), 53\u201384 (1998)","journal-title":"Journal of Computer Security"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Massacci, F., Mylopoulos, J., Zannone, N.: An Ontology for Secure Socio-Technical Systems. In: Handbook of Ontologies for Business Interaction. The IDEA Group (2007)","DOI":"10.4018\/978-1-59904-660-0.ch011"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R. Milner","year":"1992","unstructured":"Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, parts I and II. Journal of Information and Computation\u00a0100, 1\u201377 (1992)","journal-title":"Journal of Information and Computation"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"van Glabbeek, R.J.: The linear time-branching time spectrum. In: Proceedings of the Theories of Concurrency: Unification and Extension, pp. 278\u2013297 (1990)","DOI":"10.1007\/BFb0039066"},{"key":"21_CR9","unstructured":"White, S.A.: Business Process Modeling Notation (BPMN) Version 1.0. Business Process Management Initiative, BPMI. org. (May 2004)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-93851-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T17:21:08Z","timestamp":1551720068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-93851-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540749738","9783540749745"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-93851-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}