{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T17:50:11Z","timestamp":1649094611776},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,5,4]],"date-time":"2006-05-04T00:00:00Z","timestamp":1146700800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2006,7]]},"DOI":"10.1007\/s10776-006-0034-1","type":"journal-article","created":{"date-parts":[[2006,5,3]],"date-time":"2006-05-03T17:54:00Z","timestamp":1146678840000},"page":"221-228","source":"Crossref","is-referenced-by-count":0,"title":["Verification of Secure Network Protocols in Uncertain Environments"],"prefix":"10.1007","volume":"13","author":[{"given":"Sarah","family":"Damiani","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Griffin","sequence":"additional","affiliation":[]},{"given":"Shashi","family":"Phoha","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Racunas","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Rogan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,4]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"C. -M. Huang, J. -M. Hsu, H. -Y. Lai, J. -C. Pong and D. -T. Huang, An estelle interpreter for incremental protocol verification, in Proceedings of the International Conference on Network Protocols, IEEE, San Francisco, CA, USA, pp. 326\u2013333, October 19\u201322 1993","DOI":"10.1109\/ICNP.1993.340895"},{"issue":"4","key":"34_CR2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/37.56282","volume":"10","author":"C. A. Brooks","year":"1990","unstructured":"C. A. Brooks, R. Cieslak and P. Varaiya, A method for specifying, implementing, and verifying media access control protocols. IEEE Control Systems Magazine, Vol. 10, No. 4, pp. 87\u201394, 1990","journal-title":"IEEE Control Systems Magazine"},{"key":"34_CR3","unstructured":"T. Song, J. Alves-Foss, C. Ko, C. Zhang and K. Levitt, Using acl2 to verify security properties of specification-based intrusion detection systems, in Proc. ACL 2-2003, 2003"},{"issue":"1","key":"34_CR4","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1137\/0325013","volume":"25","author":"P. J. Ramadge","year":"1987","unstructured":"P. J. Ramadge and W. M. Wonham, Supervisory control of a class of discrete event processes. SIAM Journal on Control and Optimization, Vol. 25, No. 1, pp. 206\u2013230, 1987","journal-title":"SIAM Journal on Control and Optimization"},{"issue":"1","key":"34_CR5","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/5.21072","volume":"77","author":"P. J. Ramadge","year":"1989","unstructured":"P. J. Ramadge and W. M. Wonham, The control of discrete event systems, Proc. IEEE, Vol. 77, No. 1, pp. 81\u201398, 1989","journal-title":"Proc. IEEE"},{"key":"34_CR6","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"J. E. Hopcroft","year":"1979","unstructured":"J. E. Hopcroft and J. D. Ullman, Introduction to Automata Theory, Languages, and Computation, Addison-Wesley, Reading, Massachusetts, 1979"},{"key":"34_CR7","unstructured":"C. Griffin, A note on deciding controllability in pushdown systems. Internal Document: Contact cgriffin@psu.edu to obtain a copy, 2003"},{"key":"34_CR8","unstructured":"T. Lindholm, Setting up a bluetooth packet transport link, February 23 2003"},{"key":"34_CR9","unstructured":"Microsoft Corporation. SQL server notification services books online: Building notification services applications, February 23 2003"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"S. Damiani, C. Griffin, and S. Phoha, Automated generation of discrete event controllers for dynamic reconfiguration of autonomous sensor networks, in Proceedings of the 48th Annual SPIE Conference, San Diego, CA, USA, August 2003","DOI":"10.1117\/12.508652"},{"key":"34_CR11","unstructured":"R. Sekar, Y. Cai, and M. Segal. A specification-based approach for building survivable systems, in Proceedings of the 21st NIST-NCSC National Information Systems Security Conference, pp. 338\u2013347, 1998"},{"issue":"2","key":"34_CR12","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D. Denning","year":"1987","unstructured":"D. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, Vol. 13, No. 2, pp. 222\u2013232, 1987","journal-title":"IEEE Transactions on Software Engineering"},{"key":"34_CR13","volume-title":"Dynamic Programming","author":"R. Bellman","year":"1957","unstructured":"R. Bellman, Dynamic Programming, Princeton University Press, Princeton, NJ, 1957"},{"issue":"3","key":"34_CR14","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/0167-6911(91)90061-I","volume":"17","author":"R. Kumar","year":"1991","unstructured":"R. Kumar, V. K. Garg and S. L. Marcus, On controllability and normality of discrete event dynamical systems. Systems and Control Letters, Vol. 17, No. 3, pp. 157\u2013168, 1991","journal-title":"Systems and Control Letters"},{"issue":"3","key":"34_CR15","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1137\/0325036","volume":"25","author":"P. J. Ramadge","year":"1987","unstructured":"P. J. Ramadge and W. M. Wonham, On the supremal controllable sublanguage of a given language. SIAM Journal on Control and Optimization, Vol. 25, No. 3, pp. 637\u2013659, 1987","journal-title":"SIAM Journal on Control and Optimization"},{"key":"34_CR16","unstructured":"C. Griffin and S. Phoha. Formal specifications for sensor network missions, in Sensor Network Operations, IEEE Press, 2004"},{"key":"34_CR17","unstructured":"C. Griffin and S. Phoha. Model building and model checking tools, in Sensor Network Operations, IEEE Press, 2004"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-006-0034-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-006-0034-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-006-0034-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T08:01:31Z","timestamp":1559289691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-006-0034-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,5,4]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,7]]}},"alternative-id":["34"],"URL":"https:\/\/doi.org\/10.1007\/s10776-006-0034-1","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,5,4]]}}}