{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:11:14Z","timestamp":1742926274738,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642027031"},{"type":"electronic","value":"9783642027048"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02704-8_18","type":"book-chapter","created":{"date-parts":[[2009,6,29]],"date-time":"2009-06-29T13:32:50Z","timestamp":1246282370000},"page":"236-248","source":"Crossref","is-referenced-by-count":0,"title":["Theories of Trust for Communication Protocols"],"prefix":"10.1007","author":[{"given":"Ji","family":"Ma","sequence":"first","affiliation":[]},{"given":"Mehmet A.","family":"Orgun","sequence":"additional","affiliation":[]},{"given":"Abdul","family":"Sattar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Computer Society Symposium on research in Security and Privacy, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-36187-1_6","volume-title":"AI 2002: Advances in Artificial Intelligence","author":"C. Liu","year":"2002","unstructured":"Liu, C., Ozols, M.A.: Trust in secure communication systems \u2013 the concept, representations, and reasoning techniques. In: McKay, B., Slaney, J.K. (eds.) Canadian AI 2002. LNCS, vol.\u00a02557, pp. 60\u201370. Springer, Heidelberg (2002)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-45656-2_29","volume-title":"AI 2001: Advances in Artificial Intelligence","author":"C. Liu","year":"2001","unstructured":"Liu, C.: Logical foundations for reasoning about trust in secure digital communication. In: Stumptner, M., Corbett, D.R., Brooks, M. (eds.) Canadian AI 2001. LNCS, vol.\u00a02256, pp. 333\u2013344. Springer, Heidelberg (2001)"},{"key":"18_CR5","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1109\/RISP.1990.63854","volume-title":"Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy","author":"L. Gong","year":"1990","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 234\u2013248. IEEE Computer Society Press, Los Alamitos (1990)"},{"key":"18_CR6","first-page":"233","volume-title":"Proceedings of the 1st ACM Conference on Computer and Communications Security","author":"P.C.V. Oorschot","year":"1993","unstructured":"Oorschot, P.C.V.: Extending cryptographic logics of belief to key agreement protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 233\u2013243. ACM Press, New York (1993)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Oorschot, P.C.V.: A unified cryptographic protocol logic. NRL Publication (1996)","DOI":"10.21236\/ADA464967"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Abadi, M., Tuttle, M.R.: A semantics for a logic of authentication (extended abstract). In: PODC, pp. 201\u2013216 (1991)","DOI":"10.1145\/112600.112618"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/CSFW.1989.40587","volume-title":"Proceedings of the Computer Security Foundations Workshop II","author":"L. Moser","year":"1989","unstructured":"Moser, L.: A logic of knowledge and belief for reasoning about computer security. In: Proceedings of the Computer Security Foundations Workshop II, pp. 57\u201363. IEEE Computer Society Press, Los Alamitos (1989)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-61770-1_39","volume-title":"Computer Security - ESORICS 96","author":"G. Wedel","year":"1996","unstructured":"Wedel, G., Kessler, V.: Formal semantics for authentication logics. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 219\u2013241. Springer, Heidelberg (1996)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems - a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pp. 150\u2013164 (1993)","DOI":"10.1109\/RISP.1993.287635"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","first-page":"93","volume-title":"Computer Security - ESORICS 94","author":"C. Boyd","year":"1994","unstructured":"Boyd, C., Mao, W.: Designing secure key exchange protocols. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875, pp. 93\u2013105. Springer, Heidelberg (1994)"},{"key":"18_CR13","unstructured":"Bacchus, F., Grove, A.J., Halpern, J.Y., Koller, D.: From statistical knowledge bases to degrees of belief. CoRR cs.AI\/0307056 (2003)"},{"issue":"1","key":"18_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1093\/logcom\/13.1.3","volume":"12","author":"D. Gabbay","year":"2003","unstructured":"Gabbay, D., Pigozzi, G., Woods, J.: Controlled revision \u2013 an algorithmic approach for belief revision. Journal of Logic and Computation\u00a012(1), 3\u201322 (2003)","journal-title":"Journal of Logic and Computation"},{"key":"18_CR15","unstructured":"Weydert, E.: Ranking revision reloaded. In: Formal Models of Belief Change in Rational Agents (2007)"},{"issue":"1","key":"18_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.inffus.2005.06.004","volume":"8","author":"P. Smets","year":"2007","unstructured":"Smets, P., Ristic, B.: Kalman filter and joint tracking and classification based on belief functions in the tbm framework. Information Fusion\u00a08(1), 16\u201327 (2007)","journal-title":"Information Fusion"},{"issue":"1","key":"18_CR17","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10796-007-9049-0","volume":"10","author":"J. Ma","year":"2008","unstructured":"Ma, J., Orgun, M.A.: Formalising theories of trust for authentication protocols. Information Systems Frontiers\u00a010(1), 19\u201332 (2008)","journal-title":"Information Systems Frontiers"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/BF00156915","volume":"1","author":"M. Finger","year":"1992","unstructured":"Finger, M., Gabbay, D.M.: Adding a temporal dimension to a logic system. Journal of Logic, Language and Information\u00a01, 203\u2013233 (1992)","journal-title":"Journal of Logic, Language and Information"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/11589990_6","volume-title":"AI 2005: Advances in Artificial Intelligence","author":"C. Liu","year":"2005","unstructured":"Liu, C., Ozols, M.A., Orgun, M.A.: A fibred belief logic for multiagent systems. In: Zhang, S., Jarvis, R. (eds.) AI 2005. LNCS, vol.\u00a03809, pp. 29\u201338. Springer, Heidelberg (2005)"},{"key":"18_CR20","unstructured":"Orgun, M.A., Governatori, G., Liu, C.: Modal tableaux for verifying security protocols. In: Proceedings of the Formal Approaches to Multi-Agent Systems, FAMAS 2006, pp. 31\u201346. Riva del Garda, Italy (2006)"},{"issue":"1","key":"18_CR21","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10458-007-9027-4","volume":"19","author":"M.A. Orgun","year":"2009","unstructured":"Orgun, M.A., Liu, C., Governatori, G.: Modal tableaux for verifying stream authentication protocols. Autonomous Agents and Multi-Agent Systems\u00a019(1), 53\u201375 (2009)","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"issue":"5\/6","key":"18_CR22","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1006\/jsco.1996.0072","volume":"22","author":"C. Liu","year":"1996","unstructured":"Liu, C., Orgun, M.A.: Dealing with multiple granularity of time in temporal logic programming. Journal of Symbolic Computation\u00a022(5\/6), 699\u2013720 (1996)","journal-title":"Journal of Symbolic Computation"},{"issue":"4","key":"18_CR23","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1023\/A:1008355230754","volume":"9","author":"D.M. Gabbay","year":"2000","unstructured":"Gabbay, D.M.: Fibring logics. Journal of Logic, Language and Information\u00a09(4), 511\u2013513 (2000)","journal-title":"Journal of Logic, Language and Information"},{"issue":"4","key":"18_CR24","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.2307\/2275487","volume":"56","author":"M. Kracht","year":"1991","unstructured":"Kracht, M., Wolter, F.: Properties of independently axiomatizable bimodal logics. The Journal of Symbolic Logic\u00a056(4), 1469\u20131485 (1991)","journal-title":"The Journal of Symbolic Logic"},{"issue":"1","key":"18_CR25","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1093\/jigpal\/6.1.73","volume":"6","author":"D.M. Gabbay","year":"1998","unstructured":"Gabbay, D.M., Shehtman, V.B.: Products of modal logics, part 1. Logic Journal of the IGPL\u00a06(1), 73\u2013146 (1998)","journal-title":"Logic Journal of the IGPL"},{"key":"18_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-540-30502-6_10","volume-title":"Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making","author":"C. Liu","year":"2004","unstructured":"Liu, C., Ozols, M.A., Orgun, M.A.: A temporalised belief logic for specifying the dynamics of trust for multi-agent systems. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol.\u00a03321, pp. 142\u2013156. Springer, Heidelberg (2004)"},{"key":"18_CR27","unstructured":"Liu, C., McLean, P., Ozols, M.A.: Combining logics for modelling security policies. In: ACSC, pp. 323\u2013332 (2005)"},{"key":"18_CR28","series-title":"Oxford Logic Guides","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198503811.001.0001","volume-title":"Fibring Logics","author":"D.M. Gabbay","year":"1998","unstructured":"Gabbay, D.M.: Fibring Logics. Oxford Logic Guides, vol.\u00a038. Oxford University Press, Oxford (1998)"},{"key":"18_CR29","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/DASC.2006.19","volume-title":"Proceedings of the 2nd International Symposium on Dependable Autonomic and Secure Computing","author":"M.A. Orgun","year":"2006","unstructured":"Orgun, M.A., Ma, J., Liu, C., Governatori, G.: Analysing stream authentication protocols in autonomous agent-based systems. In: Proceedings of the 2nd International Symposium on Dependable Autonomic and Secure Computing, pp. 325\u2013332. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"18_CR30","first-page":"83","volume":"16","author":"S.A. Kripke","year":"1963","unstructured":"Kripke, S.A.: Semantical considerations on modal logic. Acta Philosophica Fennica\u00a016, 83\u201394 (1963)","journal-title":"Acta Philosophica Fennica"},{"key":"18_CR31","volume-title":"Proceedings of the 2008 IEEE International Conference on Distributed Human-Machine Systems (DHMS)","author":"J. Ma","year":"2008","unstructured":"Ma, J., Orgun, M.: Tableaux-based proof techniques for verifying multi-agent systems. In: Proceedings of the 2008 IEEE International Conference on Distributed Human-Machine Systems (DHMS). IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"18_CR32","unstructured":"SPORE: Security protocols open repository (2009), http:\/\/www.lsv.ens-cachan.fr\/Software\/spore\/ (last accessed April 14)"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Anderson, R.J., Needham, R.M.: Programming satan\u2019s computer. In: Computer Science Today, pp. 426\u2013440 (1995)","DOI":"10.1007\/BFb0015258"},{"key":"18_CR34","unstructured":"Lowe, G.: A family of attacks upon authentication protocols. Technical Report 1997\/5, Department of Mathematics and Computer Science, University of Leicester (1997)"},{"key":"18_CR35","unstructured":"Steiner, J.G., Neuman, B.C., Schiller, J.: Kerberos: An authentication service for open network systems. In: Proceedings of the Winter 1988 Usenix Conference, pp. 191\u2013202 (1988)"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02704-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T22:56:49Z","timestamp":1710457009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02704-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642027031","9783642027048"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02704-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}