{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:59:03Z","timestamp":1742932743831,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173578"},{"type":"electronic","value":"9783642173585"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25535-9_21","type":"book-chapter","created":{"date-parts":[[2011,11,18]],"date-time":"2011-11-18T13:17:59Z","timestamp":1321622279000},"page":"312-327","source":"Crossref","is-referenced-by-count":5,"title":["Model Driven Security Analysis of IDaaS Protocols"],"prefix":"10.1007","author":[{"given":"Apurva","family":"Kumar","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"21_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems (TOCS)\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"21_CR2","unstructured":"OASIS SAML Specifications. SAML v2.0, Core, http:\/\/saml.xml.org\/saml-specifications"},{"key":"21_CR3","unstructured":"OpenID 2.0 Specifications, http:\/\/openid.net\/specs\/openid-authentication-2_0.html"},{"key":"21_CR4","unstructured":"The OAuth 1.0 Protocol. IETF RFC: 5849, http:\/\/www.rfc-editor.org\/rfc\/rfc5849.txt"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning about Belief in Cryptographic Protocols. In: Proceedings 1990 IEEE Symposium on Research in Security and Privacy (1990)","DOI":"10.1109\/RISP.1990.63854"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Abadi, M., Tuttle, M.R.: A semantics for a logic of authentication. In: Proceedings of the ACM Symposium of Principles of Distributed Computing (1991)","DOI":"10.1145\/112600.112618"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Kessler, V., Wedel, G.: AUTLOG: An advanced logic of authentication. In: Proceedings of Computer Security Foundation Workshop VII, pp. 90\u201399 (1994)","DOI":"10.1109\/CSFW.1994.315944"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Syverson, P., van Oorschot, P.: On unifying some cryptographic protocol logics. In: Proceedings of the Symposium on Security and Privacy, Oakland, CA, pp. 14\u201328 (1994)","DOI":"10.21236\/ADA465512"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","first-page":"831","volume-title":"Automated Deduction - CADE-14","author":"J. Schumann","year":"1997","unstructured":"Schumann, J.: Automatic Verification of Cryptographic Protocols with SETHEO. In: McCune, W. (ed.) CADE 1997. LNCS, vol.\u00a01249, pp. 831\u2013836. Springer, Heidelberg (1997)"},{"key":"21_CR10","unstructured":"Craigen, D., Saaltink, M.: Using EVES to analyze authentication protocols. Technical Report TR-96-5508-05, ORA Canada (1996)"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"IT-29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inform. Theory\u00a0IT-29, 198\u2013208 (1983)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3233\/JCS-1992-1102","volume":"1","author":"C. Meadows","year":"1992","unstructured":"Meadows, C.: Applying formal methods to the analysis of a key management protocol. Journal of Computer Security\u00a01, 5\u201353 (1992)","journal-title":"Journal of Computer Security"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Armando, A., et al.: An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. Elec. Notes in Theoret. Comp. Sci.\u00a0125(1) (March 2005)","DOI":"10.1016\/j.entcs.2004.05.021"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Gro\u00df, T.: Security analysis of the SAML single sign-on browser\/artifact profile. In: Proceedings of 19th ACSAC 2003, pp 298\u2013307. IEEE Computer Society Press (2003)","DOI":"10.1109\/CSAC.2003.1254334"},{"key":"21_CR16","unstructured":"Hammer-Lahav, E.: Explaining the OAuth Session Fixation Attack, http:\/\/hueniverse.com\/2009\/04\/explaining-the-oauth-session-fixation-attack\/"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-540-89652-4_47","volume-title":"Service-Oriented Computing \u2013 ICSOC 2008","author":"A. Kumar","year":"2008","unstructured":"Kumar, A.: Integrated Security Context Management of Web Components and Services in Federated Identity Environments. In: Bouguettaya, A., Krueger, I., Margaria, T. (eds.) ICSOC 2008. LNCS, vol.\u00a05364, pp. 565\u2013571. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25535-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T06:23:17Z","timestamp":1741933397000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25535-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642173578","9783642173585"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25535-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}