{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:55:18Z","timestamp":1725540918883},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107719"},{"type":"electronic","value":"9783642107726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10772-6_6","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T02:37:49Z","timestamp":1258079869000},"page":"55-70","source":"Crossref","is-referenced-by-count":4,"title":["On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals"],"prefix":"10.1007","author":[{"given":"Massimiliano","family":"Masi","sequence":"first","affiliation":[]},{"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Tiezzi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"The IHE Initiative: IT Infrastructure Technical Framework (2009), http:\/\/www.ihe.net"},{"key":"6_CR2","unstructured":"OASIS Security Services TC: Assertions and protocols for the OASIS security assertion markup language (SAML) v2.02 (2005)"},{"key":"6_CR3","unstructured":"OASIS\/ebXML Registry Technical Committee: ebXML business process specification schema technical specification v2.0.4 (2006), http:\/\/www.ebxml.org"},{"key":"6_CR4","unstructured":"OASIS Web Services Security TC: WS-Trust 1.3 specification (2007)"},{"key":"6_CR5","unstructured":"GIP DMP: Dossier M\u00e9dical Personnel A French Project, http:\/\/www.d-m-p.org"},{"key":"6_CR6","unstructured":"ARGE-ELGA: Die Arbeitsgemeinschaft Elektronische Gesundheitsakte, http:\/\/www.arge-elga.at"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. Technical Report RFC 5246, IETF (August 2008)","DOI":"10.17487\/rfc5246"},{"key":"6_CR8","unstructured":"OASIS Web Services Security TC: Web service security: SOAP message security (2006)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: TulaFale: A Security Tool for Web Services. CoRR\u00a0abs\/cs\/0412044 (2004)","DOI":"10.1007\/978-3-540-30101-1_9"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1111348.1111355","volume-title":"SWS","author":"K. Bhargavan","year":"2004","unstructured":"Bhargavan, K., Corin, R., Fournet, C., Gordon, A.D.: Secure sessions for web services. In: SWS, pp. 56\u201366. ACM, New York (2004)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Kleiner, E., Roscoe, A.W.: On the relationship between web services security and traditional protocols. In: Mathematical Foundations of Programming Semantics, MFPS XXI (2005)","DOI":"10.1016\/j.entcs.2005.11.074"},{"key":"6_CR12","volume-title":"FMSE","author":"A. Armando","year":"2008","unstructured":"Armando, A., et al.: Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In: FMSE. ACM, New York (2008)"},{"key":"6_CR13","first-page":"31","volume-title":"A hierarchy of authentication specifications","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: A hierarchy of authentication specifications, pp. 31\u201343. IEEE, Los Alamitos (1997)"},{"key":"6_CR14","unstructured":"ACR-NEMA: Digital imaging and communications in medicine, dicom (1995)"},{"key":"6_CR15","unstructured":"Health Level Seven organization: Hl7 standards (2009), http:\/\/www.hl7.org"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-71316-6_4","volume-title":"Programming Languages and Systems","author":"A. Lapadula","year":"2007","unstructured":"Lapadula, A., Pugliese, R., Tiezzi, F.: A calculus for orchestration of web services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol.\u00a04421, pp. 33\u201347. Springer, Heidelberg (2007)"},{"key":"6_CR17","unstructured":"Masi, M., Pugliese, R., Tiezzi, F.: On secure implementation of an IHE XUA-based protocol for authenticating healthcare professionals (full version), http:\/\/rap.dsi.unifi.it\/cows\/"},{"key":"6_CR18","unstructured":"OASIS Security Services TC: SAML v2.0 Holder-of-Key Assertion Profile (March 2009)"},{"key":"6_CR19","unstructured":"Gudgin, M., Hadley, M., Rogers, T.: Web Services Addressing 1.0 - Core. Technical report, W3C, W3C Recommendation (May 2006)"},{"key":"6_CR20","unstructured":"OASIS Web Services Security TC: Username token profile v1.1 (2006)"},{"key":"6_CR21","unstructured":"Lapadula, A., Pugliese, R., Tiezzi, F.: A Calculus for Orchestration of Web Services (full version). Technical report, Dipartimento di Sistemi e Informatica, Univ. Firenze (2008), http:\/\/rap.dsi.unifi.it\/cows"},{"key":"6_CR22","unstructured":"OASIS WSBPEL TC: Web Services Business Process Execution Language v2.0 (2007)"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"2111","DOI":"10.1145\/1529282.1529751","volume-title":"2009 ACM Symposium on Applied Computing (SAC)","author":"M. Beek ter","year":"2009","unstructured":"ter Beek, M.H., Gnesi, S., Mazzanti, F.: CMC-UMC: A framework for the verification of abstract service-oriented properties. In: Shin, S.Y., Ossowski, S. (eds.) 2009 ACM Symposium on Applied Computing (SAC), pp. 2111\u20132117. ACM, New York (2009)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL, pp. 104\u2013115 (2001)","DOI":"10.1145\/360204.360213"},{"key":"6_CR25","first-page":"63","volume-title":"16th Computer Security Foundations Workshop","author":"P. Broadfoot","year":"2003","unstructured":"Broadfoot, P., Lowe, G.: On distributed security transactions that use secure transport protocols. In: 16th Computer Security Foundations Workshop, pp. 63\u201373. IEEE, Los Alamitos (2003)"},{"issue":"2","key":"6_CR26","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-540-78743-3_17","volume-title":"Fundamental Approaches to Software Engineering","author":"A. Fantechi","year":"2008","unstructured":"Fantechi, A., Gnesi, S., Lapadula, A., Mazzanti, F., Pugliese, R., Tiezzi, F.: A model checking approach for verifying COWS specifications. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, vol.\u00a04961, pp. 230\u2013245. Springer, Heidelberg (2008)"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: CryptoVerif: Computationally sound mechanized prover for cryptographic protocols. In: Dagstuhl seminar Formal Protocol Verification Applied (October 2007)","DOI":"10.1109\/SP.2006.1"},{"key":"6_CR29","first-page":"298","volume-title":"ACSAC","author":"T. Gro\u00df","year":"2003","unstructured":"Gro\u00df, T.: Security analysis of the saml single sign-on browser\/artifact profile. In: ACSAC, pp. 298\u2013307. IEEE, Los Alamitos (2003)"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1045405.1045409","volume-title":"WITS","author":"S. Hansen","year":"2005","unstructured":"Hansen, S., Skriver, J., Nielson, H.: Using static analysis to validate the saml single sign-on protocol. In: WITS, pp. 27\u201340. ACM, New York (2005)"},{"key":"6_CR31","unstructured":"OASIS Security Services TC: Profiles for the OASIS Security Assertion Markup Language (SAML) v2.0 (2005)"},{"key":"6_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A. Armando","year":"2005","unstructured":"Armando, A., et al.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 281\u2013285. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10772-6_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T10:35:39Z","timestamp":1685183739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10772-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642107719","9783642107726"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10772-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}