{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:46:26Z","timestamp":1743043586095,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642021206"},{"type":"electronic","value":"9783642021213"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02121-3_36","type":"book-chapter","created":{"date-parts":[[2009,5,20]],"date-time":"2009-05-20T06:58:54Z","timestamp":1242802734000},"page":"476-490","source":"Crossref","is-referenced-by-count":0,"title":["Middleware for Automated Implementation of Security Protocols"],"prefix":"10.1007","author":[{"given":"B\u00e9la","family":"Genge","sequence":"first","affiliation":[]},{"given":"Piroska","family":"Haller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Scenarios: Models, Transformations and Tools","author":"C.J.F. Cremers","year":"2005","unstructured":"Cremers, C.J.F., Mauw, S.: Checking secrecy by means of partial order reduction. In: Leue, S., Syst\u00e4, T.J. (eds.) Scenarios: Models, Transformations and Tools. LNCS, vol.\u00a03466. Springer, Heidelberg (2005)"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Mengual, L., Barcia, N., Jimenez, E., Menasalvas, E., Setien, J., Yaguez, J.: Automatic implementation system of security protocols based on formal description techniques. In: Proceedings of the Seventh International Symposium on Computers and Communications, pp. 355\u2013401 (2002)","DOI":"10.1109\/ISCC.2002.1021701"},{"key":"36_CR3","unstructured":"Abdullah, I., Menasc\u00e9, D.: Protocol specification and automatic implementation using XML and CBSE. In: IASTED conference on Communications, Internet and Information Technology (2003)"},{"key":"36_CR4","unstructured":"Akkiraju, R., Farrell, J., Miller, J., Nagarajan, M., Schmidt, M., Verma, K.: Web Service Semantics - WSDL-S. A joint UGA-IBM Technical Note (2005)"},{"key":"36_CR5","unstructured":"Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature: Version 1.0. York University (1997)"},{"key":"36_CR6","first-page":"162","volume-title":"Proceedings of the 9th CSFW","author":"L. Gavin","year":"1996","unstructured":"Gavin, L.: Some new attacks upon security protocols. In: Proceedings of the 9th CSFW, pp. 162\u2013169. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.entcs.2004.12.047","volume":"142","author":"C.J.F. Cremers","year":"2006","unstructured":"Cremers, C.J.F.: Compositionality of Security Protocols: A Research Agenda. Electr. Notes Theor. Comput. Sci.\u00a0142, 99\u2013110 (2006)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"36_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1007\/11575801_34","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"A. Kim","year":"2005","unstructured":"Kim, A., Luo, J., Kang, M.: Security ontology for annotating resources. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol.\u00a03761, pp. 1483\u20131499. Springer, Heidelberg (2005)"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Blanco, C., Lasheras, J., Valencia-Garcia, R., Fernandez-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: Proc. of the Third International Conference on Availability, Reliability and Security, pp. 813\u2013820 (2008)","DOI":"10.1109\/ARES.2008.33"},{"issue":"10","key":"36_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.istr.2004.11.002","volume":"1","author":"G. Denkera","year":"2005","unstructured":"Denkera, G., Kagal, L., Finin, T.: Security in the semantic web using owl. Information Security Technical Report\u00a01(10), 51\u201358 (2005)","journal-title":"Information Security Technical Report"},{"key":"36_CR11","unstructured":"Gong, L.: Fail-Stop Protocols: An Approach to Designing Secure Protocols. In: Proceedings of the 5th IFIP Conference on Dependable Computing and Fault-Tolerant Systems, pp. 44\u201355 (1995)"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Martin, D., Paolucci, M., Wagner, M.: Toward Semantic Annotations of Web Services: OWL-S from the SAWSDL Perspective. In: OWL-S: Experiences and Directions - workshop at 4th European Semantic Web Conf. (2007)","DOI":"10.1007\/978-3-540-76298-0_25"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Ostheimer, D., Lemay, S., Ghazal, M., Mayisela, D., Amer, A., Dagba, P.: A Modular Distributed Video Surveillance System Over IP. In: Electrical and Computer Engineering Canadian Conference, pp. 518\u2013521 (2006)","DOI":"10.1109\/CCECE.2006.277603"},{"key":"36_CR14","unstructured":"Genge, B., Haller, P.: Extending WS-Security to Implement Security Protocols for Web Services. In: International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics, Targu Mures, Romania (to appear, 2009)"},{"key":"36_CR15","unstructured":"World Wide Web Consortium, OWL Web Ontology Language Reference, W3C Recommendation (2004)"},{"key":"36_CR16","unstructured":"Gutmann, P.: Cryptlib Encryption Toolkit, http:\/\/www.cs.auckland.ac.nz\/-~pgut001\/cryptlib\/index.html"},{"key":"36_CR17","unstructured":"OpenSSL Project, version 0.9.8h, http:\/\/www.openssl.org\/"},{"key":"36_CR18","unstructured":"Laboratoire Specification et Verification, Security Protocol Open Repository, http:\/\/www.lsv.ens-cachan.fr\/spore"},{"key":"36_CR19","unstructured":"Organization for the Advancement of Structured Information Standards, SAML V2.0 OASIS Standard Specification (2007), http:\/\/saml.xml.org\/"},{"key":"36_CR20","unstructured":"Organization for the Advancement of Structured Information Standards, OASIS Web Services Security (WSS) (2006), http:\/\/saml.xml.org\/"},{"key":"36_CR21","unstructured":"Organization for the Advancement of Structured Information Standards, WS-Trust (2007), http:\/\/docs.oasis-open.org\/ws-sx\/ws-trust\/200512\/ws-trust-1.3-os.html"},{"key":"36_CR22","unstructured":"Organization for the Advancement of Structured Information Standards, UDDI (2004), http:\/\/www.uddi.org\/pubs\/uddi_v3.htm"}],"container-title":["Lecture Notes in Computer Science","The Semantic Web: Research and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02121-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T03:40:17Z","timestamp":1558323617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02121-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642021206","9783642021213"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02121-3_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}