{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:36:20Z","timestamp":1742913380441,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642204005"},{"type":"electronic","value":"9783642204012"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20401-2_17","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T10:53:38Z","timestamp":1315392818000},"page":"369-389","source":"Crossref","is-referenced-by-count":2,"title":["Analysing Protocol Stacks for Services"],"prefix":"10.1007","author":[{"given":"Han","family":"Gao","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, T., Compagna, L.: LTL model checking for security protocols. In: Proc. 20th CSFW (2007)","DOI":"10.1109\/CSF.2007.24"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, T., Compagna, L., Cuellar, J., Tobarra, L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based sign on for Google appa. In: Proc. 6th ACM Workshop on Formal Methods in Security Engineering (2008)","DOI":"10.1145\/1456396.1456397"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bella, G., Longo, C., Paulson, L.: Verifying second-level security protocols. In: Theorem Proving in Higher Order Logics (2003)","DOI":"10.1007\/10930755_23"},{"key":"17_CR5","unstructured":"Broadfoot, P., Lowe, G.: On distributed security transactions that use secure transfport protocols. In: Proc. 16th CSFW (2003)"},{"issue":"3","key":"17_CR6","doi-asserted-by":"publisher","first-page":"347","DOI":"10.3233\/JCS-2005-13302","volume":"13","author":"C. Bodei","year":"2005","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static Validation of Security Protocols. Journal of Computer Security\u00a013(3), 347\u2013390 (2005)","journal-title":"Journal of Computer Security"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-68863-1_3","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"M. Boreale","year":"2008","unstructured":"Boreale, M., Bruni, R., De Nicola, R., Loreti, M.: Sessions and Pipelines for Structured Service Programming. In: Barthe, G., de Boer, F.S. (eds.) FMOODS 2008. LNCS, vol.\u00a05051, pp. 19\u201338. Springer, Heidelberg (2008)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Boyd, C.: Security architectures using formal methods. IEEE Journal on Selected Areas in Communications\u00a011(5) (1993)","DOI":"10.1109\/49.223872"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Focardi, R.: Language based secure communication. In: Proc. 21st CSFS (2008)","DOI":"10.1109\/CSF.2008.17"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS protocol version 1.0. RFC 2246, Internet Engineering Task Force (January 1999)","DOI":"10.17487\/rfc2246"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Dilloway, C., Lowe, G.: Specifying secure channels. In: Proc. 21st CSFS (2008)","DOI":"10.1109\/CSF.2008.14"},{"key":"17_CR12","unstructured":"Dilloway, C.: On the Specification and Analysis of Secure Transport Protocols. PhD Thesis, Oxford University (2008)"},{"issue":"12","key":"17_CR13","first-page":"198","volume":"IT-29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. IEEE TIT\u00a0IT-29(12), 198\u2013208 (1983)","journal-title":"IEEE TIT"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Hansen, S., Skriver, J., Riis Nielson, H.: Using static analysis to validate the SAML Single Sign-On protocol. In: Proceedings of Workshop on Issues in the Theory of Security (WITS 2005) (2005)","DOI":"10.1145\/1045405.1045409"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security - ESORICS 94","author":"U. Maurer","year":"1994","unstructured":"Maurer, U., Schmid, P.: A Calculus for secure channel establishment in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875. Springer, Heidelberg (1994)"},{"key":"17_CR16","volume-title":"Communicating and mobile systems: the \u03c0-calculus","author":"R. Milner","year":"1999","unstructured":"Milner, R.: Communicating and mobile systems: the \u03c0-calculus. Cambridge University Press, Cambridge (1999)"},{"key":"17_CR17","unstructured":"Nielsen, C.R., Alessandrini, M., Pollmeier, M., Nielson, H.R.: Formalising the S&N Credit Request. Confidential Sensoriainternal report (Only for use within the Consultion) (2007)"},{"key":"17_CR18","unstructured":"Organization for the Advancement of Structured Information Standards, http:\/\/www.oasis-open.org\/"},{"key":"17_CR19","unstructured":"Simple Object Access Protocol (SOAP). W3C, http:\/\/www.w3.org\/TR\/soap\/"},{"key":"17_CR20","unstructured":"X.200 : Information technology - Open Systems Interconnection - Basic Reference Model: The basic model"},{"key":"17_CR21","unstructured":"OASIS Web Services Security (WSS) TC, http:\/\/www.oasis-open.org\/"}],"container-title":["Lecture Notes in Computer Science","Rigorous Software Engineering for Service-Oriented Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20401-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T22:51:21Z","timestamp":1560552681000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20401-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642204005","9783642204012"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20401-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}