{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:49:51Z","timestamp":1725580191532},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642208973"},{"type":"electronic","value":"9783642208980"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20898-0_14","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T04:33:57Z","timestamp":1302237237000},"page":"193-207","source":"Crossref","is-referenced-by-count":2,"title":["Towards Formal Validation of Trust and Security in the Internet of Services"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Carbone","sequence":"first","affiliation":[]},{"given":"Marius","family":"Minea","sequence":"additional","affiliation":[]},{"given":"Sebastian Alexander","family":"M\u00f6dersheim","sequence":"additional","affiliation":[]},{"given":"Serena Elisa","family":"Ponta","sequence":"additional","affiliation":[]},{"given":"Mathieu","family":"Turuani","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Vigan\u00f2","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"14_CR1","doi-asserted-by":"publisher","first-page":"403","DOI":"10.3166\/jancl.19.403-429","volume":"19","author":"Alessandro Armando","year":"2009","unstructured":"Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. Journal of Applied Non-Classical Logics, special issue on Logic and Information Security, 403\u2013429 (2009)","journal-title":"Journal of Applied Non-Classical Logics"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Compagna, L., Cu\u00e9llar, J., Pellegrino, G., Sorniotti, A.: From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure? In: Proceedings of IFIP SEC 2011 (to appear)","DOI":"10.1007\/978-3-642-21424-0_6"},{"key":"14_CR3","first-page":"1","volume-title":"Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008)","author":"A. Armando","year":"2008","unstructured":"Armando, A., Carbone, R., Compagna, L., Cuellar, J., Tobarra Abad, L.: Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), pp. 1\u201310. ACM Press, New York (2008)"},{"key":"14_CR4","unstructured":"AVANTSSAR: Automated Validation of Trust and Security of Service-Oriented Architectures. FP7-ICT-2007-1, Project No. 216471, \n                    \n                      http:\/\/www.avantssar.eu\n                    \n                    \n                  , 01.01.2008\u201331.12.2010"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11841197_6","volume-title":"Web Services and Formal Methods","author":"K. Bhargavan","year":"2006","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D.: Verified Reference Implementations of WS-Security Protocols. In: Bravetti, M., N\u00fa\u00f1ez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol.\u00a04184, pp. 88\u2013106. Springer, Heidelberg (2006)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-540-30101-1_9","volume-title":"Formal Methods for Components and Objects","author":"K. Bhargavan","year":"2004","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: Tulafale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol.\u00a03188, pp. 197\u2013222. Springer, Heidelberg (2004)"},{"key":"14_CR7","first-page":"82","volume-title":"Proceedings of the 14th IEEE Computer Security Foundations Workshop","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 82\u201396. IEEE Computer Society Press, Los Alamitos (2001)"},{"issue":"3","key":"14_CR8","doi-asserted-by":"publisher","first-page":"347","DOI":"10.3233\/JCS-2005-13302","volume":"13","author":"C. Bodei","year":"2005","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Journal of Computer Security\u00a013(3), 347\u2013390 (2005)","journal-title":"Journal of Computer Security"},{"key":"14_CR9","unstructured":"Boichut, Y., H\u00e9am, P.-C., Kouchnarenko, O.: TA4SP (2004), \n                    \n                      http:\/\/www.univ-orleans.fr\/lifo\/Members\/Yohan.Boichut\/ta4sp.html"},{"key":"14_CR10","first-page":"260","volume-title":"Proceedings of the 17th ACM conference on Computer and Communications Security (CCS 2010)","author":"M. Bortolozzo","year":"2010","unstructured":"Bortolozzo, M., Centenaro, M., Focardi, R., Steel, G.: Attacking and Fixing PKCS#11 Security Tokens. In: Proceedings of the 17th ACM conference on Computer and Communications Security (CCS 2010), pp. 260\u2013269. ACM Press, New York (2010)"},{"key":"14_CR11","first-page":"529","volume-title":"Proceedings of Web Service Composition and Adaptation Workshop (held in conjunction with SCC\/SERVICES-2008)","author":"Y. Chevalier","year":"2008","unstructured":"Chevalier, Y., Mekki, M.A., Rusinowitch, M.: Automatic Composition of Services with Security Policies. In: Proceedings of Web Service Composition and Adaptation Workshop (held in conjunction with SCC\/SERVICES-2008), pp. 529\u2013537. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"14_CR12","first-page":"322","volume-title":"Proceedings of 23rd IEEE Computer Security Foundations Symposium","author":"S. Ciob\u00e2ca","year":"2010","unstructured":"Ciob\u00e2ca, S., Cortier, V.: Protocol composition for arbitrary primitives. In: Proceedings of 23rd IEEE Computer Security Foundations Symposium, pp. 322\u2013336. IEEE Computer Society Press, Los Alamitos (2010)"},{"key":"14_CR13","volume-title":"Model Checking","author":"E.M. Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/3-540-44881-0_12","volume-title":"Rewriting Techniques and Applications","author":"Hubert Comon-Lundh","year":"2003","unstructured":"Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. Technical Report LSV-03-3, Laboratoire Specification and Verification, ENS de Cachan, France (2003)"},{"issue":"1","key":"14_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10703-008-0059-4","volume":"34","author":"V. Cortier","year":"2009","unstructured":"Cortier, V., Delaune, S.: Safely composing security protocols. Formal Methods in System Design\u00a034(1), 1\u201336 (2009)","journal-title":"Formal Methods in System Design"},{"key":"14_CR16","volume-title":"Proceedings of the 19th MFPS, ENTCS 83","author":"A. Datta","year":"2004","unstructured":"Datta, A., Derek, A., Mitchell, J., Pavlovic, D.: Secure protocol composition. In: Proceedings of the 19th MFPS, ENTCS 83, Elsevier, Amsterdam (2004)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory\u00a02(29) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"14_CR18","first-page":"655","volume-title":"Handbook of Modal Logic","author":"I. Hodkinson","year":"2006","unstructured":"Hodkinson, I., Reynolds, M.: Temporal Logic. In: Blackburn, P., van Benthem, J., Wolter, F. (eds.) Handbook of Modal Logic, pp. 655\u2013720. Elsevier, Amsterdam (2006)"},{"issue":"1","key":"14_CR19","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.jlap.2006.05.007","volume":"70","author":"R. Lucchi","year":"2007","unstructured":"Lucchi, R., Mazzara, M.: A pi-calculus based semantics for WS-BPEL. Journal of Logic and Algebraic Programming\u00a070(1), 96\u2013118 (2007)","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-01918-0_3","volume-title":"Formal Methods for Web Services","author":"A. Marconi","year":"2009","unstructured":"Marconi, A., Pistore, M.: Synthesis and Composition of Web Services. In: Bernardo, M., Padovani, L., Zavattaro, G. (eds.) SFM 2009. LNCS, vol.\u00a05569, pp. 89\u2013157. Springer, Heidelberg (2009)"},{"key":"14_CR21","first-page":"351","volume-title":"Proceedings of 17th ACM conference on Computer and Communications Security (CCS 2010)","author":"S. M\u00f6dersheim","year":"2010","unstructured":"M\u00f6dersheim, S.: Abstraction by Set-Membership \u2014 Verifying Security Protocols and Web Services with Databases. In: Proceedings of 17th ACM conference on Computer and Communications Security (CCS 2010), pp. 351\u2013360. ACM Press, New York (2010)"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-04444-1_21","volume-title":"Computer Security - ESORICS 2009","author":"S. M\u00f6dersheim","year":"2009","unstructured":"M\u00f6dersheim, S., Vigan\u00f2, L.: Secure Pseudonymous Channels. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 337\u2013354. Springer, Heidelberg (2009)"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-642-03829-7_6","volume-title":"Foundations of Security Analysis and Design V","author":"S. M\u00f6dersheim","year":"2009","unstructured":"M\u00f6dersheim, S., Vigan\u00f2, L.: The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007\/2008\/2009. LNCS, vol.\u00a05705, pp. 166\u2013194. Springer, Heidelberg (2009)"},{"key":"14_CR24","unstructured":"Oasis Consortium. Web Services Business Process Execution Language vers. 2.0 (2007), \n                    \n                      http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/OS\/wsbpel-v2.0-OS.pdf"},{"key":"14_CR25","first-page":"46","volume-title":"Proceedings of the 18th IEEE Symposium on Foundations of Computer Science","author":"A. Pnueli","year":"1977","unstructured":"Pnueli, A.: The Temporal Logic of Programs. In: Proceedings of the 18th IEEE Symposium on Foundations of Computer Science, pp. 46\u201357. IEEE Computer Society Press, Los Alamitos (1977)"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"T.\u00a0 Dierks and E.\u00a0 Rescorla. The Transport Layer Security (TLS) Protocol, Version 1.2. IETF RFC 5246 (Aug. 2008)","DOI":"10.17487\/rfc5246"},{"key":"14_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/11805618_21","volume-title":"Term Rewriting and Applications","author":"M. Turuani","year":"2006","unstructured":"Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol.\u00a04098, pp. 277\u2013286. Springer, Heidelberg (2006)"},{"key":"14_CR28","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/3-540-48660-7_34","volume-title":"Automated Deduction - CADE-16","author":"C. Weidenbach","year":"1999","unstructured":"Weidenbach, C., Afshordel, B., Brahm, U., Cohrs, C., Engel, T., Keen, E., Theobalt, C., Topic, D.: System Description: Version 1.0.0. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), vol.\u00a01632, pp. 378\u2013382. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","The Future Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20898-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T23:25:40Z","timestamp":1558567540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20898-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642208973","9783642208980"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20898-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}