{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:59:56Z","timestamp":1725641996186},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272561"},{"type":"electronic","value":"9783642272578"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27257-8_3","type":"book-chapter","created":{"date-parts":[[2011,12,12]],"date-time":"2011-12-12T00:50:42Z","timestamp":1323651042000},"page":"34-49","source":"Crossref","is-referenced-by-count":0,"title":["A Formal Security Model of a Smart Card Web Server"],"prefix":"10.1007","author":[{"given":"Pierre","family":"Neron","sequence":"first","affiliation":[]},{"given":"Quang-Huy","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/3-540-36532-X_14","volume-title":"Software Security \u2013 Theories and Systems","author":"R. Affeldt","year":"2003","unstructured":"Affeldt, R., Kobayashi, N.: Formalization and Verification of a Mail Server in Coq. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 217\u2013233. Springer, Heidelberg (2003)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Akhawe, D., Barth, A., Lam, P.E., Mitchell, J.C., Song, D.: Towards a formal foundation of web security. In: Proc. of the 23rd IEEE Computer Security Foundations Symposium, pp. 290\u2013304. IEEE Computer Society (2010)","DOI":"10.1109\/CSF.2010.27"},{"key":"3_CR3","unstructured":"Barth, A., Jackson, C., Mitchell, J.C.: Securing frame communication in browsers. In: Proc. of 17th USENIX Security Symposium (2008)"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11841197_6","volume-title":"Web Services and Formal Methods","author":"K. Bhargavan","year":"2006","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WS-security protocols. In: Bravetti, M., N\u00fa\u00f1ez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol.\u00a04184, pp. 88\u2013106. Springer, Heidelberg (2006)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-540-68237-0_15","volume-title":"FM 2008: Formal Methods","author":"B. Chetali","year":"2008","unstructured":"Chetali, B., Nguyen, Q.-H.: Industrial Use of Formal Methods for a High-Level Security Evaluation. In: Cu\u00e9llar, J., Maibaum, T., Sere, K. (eds.) FM 2008. LNCS, vol.\u00a05014, pp. 198\u2013213. Springer, Heidelberg (2008)"},{"key":"3_CR6","unstructured":"European Telecommunications Standards Institute. Smart Cards; Application invocation Application Programming Interface (API) by a UICC webserver for Java Card platform, Release 7 (2008), Ref: ETSI TS 102 588, \n                    \n                      http:\/\/pda.etsi.org\/pda\/queryform.asp"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-540-27813-9_48","volume-title":"Computer Aided Verification","author":"X. Fu","year":"2004","unstructured":"Fu, X., Bultan, T., Su, J.: WSAT: A Tool for Formal Analysis of Web Services. In: Alur, R., Peled, D.A. (eds.) CAV 2004. LNCS, vol.\u00a03114, pp. 510\u2013514. Springer, Heidelberg (2004), available at \n                    \n                      http:\/\/www.cs.ucsb.edu\/~su\/WSAT\/"},{"key":"3_CR8","unstructured":"Global Platform. GlobalPlatform Card Specification 2.2 - Remote Application Management over HTTP - Amendment B, version 0.5 (2008), \n                    \n                      http:\/\/www.globalplatform.org\/specificationscard.asp"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-540-30232-2_8","volume-title":"Formal Techniques for Networked and Distributed Systems \u2013 FORTE 2004","author":"M. Haydar","year":"2004","unstructured":"Haydar, M., Petrenko, A., Sahraoui, H.: Formal Verification of Web Applications Modeled by Communicating Automata. In: de Frutos-Escrig, D., N\u00fa\u00f1ez, M. (eds.) FORTE 2004. LNCS, vol.\u00a03235, pp. 115\u2013132. Springer, Heidelberg (2004)"},{"key":"3_CR10","unstructured":"International Organization for Standardization. Identification cards \u2013 Integrated circuit(s) cards with contacts. Part 1-11 (1987-2007), \n                    \n                      http:\/\/www.iso.org\/"},{"key":"3_CR11","unstructured":"Mitchell, J.C., Shmatikov, V., Stern, U.: Finite-state analysis of ssl 3.0. In: Proc. of 7th USENIX Security Symposium, pp. 201\u2013216 (1998)"},{"key":"3_CR12","unstructured":"Open Mobile Alliance. Smartcard Web Server V1.1 (2009), \n                    \n                      http:\/\/www.openmobilealliance.org\/technical\/release_program\/SCWS_v1_1.aspx"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Roscoe, A.W.: Modelling and verifying key-exchange protocols using csp and fdr. In: Proc. of 8th IEEE Computer Security Foundations Workshop, pp. 98\u2013107. IEEE Computer Soc. Press (1995)","DOI":"10.1109\/CSFW.1995.518556"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Shegalov, G., Weikum, G.: Formal verification of web service interaction contracts. In: Proc. of the 2008 IEEE International Conference on Services Computing, pp. 525\u2013528. IEEE Computer Society (2008)","DOI":"10.1109\/SCC.2008.67"},{"key":"3_CR15","unstructured":"The Coq Development Team. The Coq Proof Assistant, \n                    \n                      http:\/\/coq.inria.fr\/"},{"key":"3_CR16","unstructured":"The Internet Society. HTTP Authentication: Basic and Digest Access Authentication (1999), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc2617.txt"},{"key":"3_CR17","unstructured":"The Internet Society. Hypertext Transfer Protocol \u2013 HTTP\/1.1 (1999), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc2616.txt"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27257-8_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:59:18Z","timestamp":1606186758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27257-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272561","9783642272578"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27257-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}