{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:55Z","timestamp":1761611215315},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,10,4]],"date-time":"2007-10-04T00:00:00Z","timestamp":1191456000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1007\/s10796-007-9049-0","type":"journal-article","created":{"date-parts":[[2007,10,3]],"date-time":"2007-10-03T10:20:05Z","timestamp":1191406805000},"page":"19-32","source":"Crossref","is-referenced-by-count":8,"title":["Formalising theories of trust for authentication protocols"],"prefix":"10.1007","volume":"10","author":[{"given":"Ji","family":"Ma","sequence":"first","affiliation":[]},{"given":"Mehmet A.","family":"Orgun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,10,4]]},"reference":[{"issue":"1","key":"9049_CR1","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. M. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"9049_CR2","doi-asserted-by":"crossref","unstructured":"Campbell, E.\u00a0A., Safavi-Naini, R., & Pleasants, P.\u00a0A. (1992). Partial belief and probabilistic reasoning in the analysis of secure protocols. In Proceedings of the 5th IEEE computer security foundations workshop (pp. 84\u201391). IEEE Computer Society Press.","DOI":"10.1109\/CSFW.1992.236785"},{"key":"9049_CR3","doi-asserted-by":"crossref","unstructured":"Denning, D.\u00a0E., & Sacco, G.\u00a0M. (1981). Timestamps in key distribution protocols. In Commun. ACM, vol. 24.8 (pp. 533\u2013536).","DOI":"10.1145\/358722.358740"},{"key":"9049_CR4","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/BF00156915","volume":"1","author":"M. Finger","year":"1992","unstructured":"Finger, M., & Gabbay, D.\u00a0M. (1992). Adding a temporal dimension to a logic system. Journal of Logic, Language and Information, 1, 203\u2013233.","journal-title":"Journal of Logic, Language and Information"},{"key":"9049_CR5","doi-asserted-by":"crossref","unstructured":"Fisher, M., & Ghidini, C. (2002). Agents with bounded temporal resources. In Foundations and applications of multi-agent systems. UKMAS workshops 1996-2000. Selected papers, LNAI, vol. 2403 (pp. 169\u2013184). Springer.","DOI":"10.1007\/3-540-45634-1_11"},{"key":"9049_CR6","unstructured":"Fitting, M., & Mendelsohn, R.\u00a0L. (1999). First-order modal logic. Kluwer Academic Publishers."},{"issue":"4","key":"9049_CR7","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1023\/A:1008355230754","volume":"9","author":"D. M. Gabbay","year":"2000","unstructured":"Gabbay, D.\u00a0M. (2000). Fibring logics. Journal of Logic, Language and Information, 9(4), 511\u2013513.","journal-title":"Journal of Logic, Language and Information"},{"issue":"1","key":"9049_CR8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1093\/logcom\/13.1.3","volume":"13","author":"D. Gabbay","year":"2003","unstructured":"Gabbay, D., Pigozzi, G., & Woods, J. (2003). Controlled revision\u2014an algorithmic approach for belief revision. Journal of Logic and Computation, 13(1), 3\u201322.","journal-title":"Journal of Logic and Computation"},{"key":"9049_CR9","unstructured":"Giacomo, G.\u00a0D., Lenzerini, M., Poggi, A., & Rosati, R. (2006). On the update of description logic ontologies at the instance level. In Proceedings of the twenty-first national conference on artificial intelligence. AAAI Press."},{"key":"9049_CR10","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., & Yahalom, R. (1990). Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, (pp. 234\u2013248). IEEE Computer Society Press.","DOI":"10.1109\/RISP.1990.63854"},{"key":"9049_CR11","doi-asserted-by":"crossref","DOI":"10.4324\/9780203290644","volume-title":"A New Introduction to Modal Logic","author":"G. E. Hughes","year":"1996","unstructured":"Hughes, G.\u00a0E., & Cresswell, M.\u00a0J. (1996). A New Introduction to Modal Logic. London: Routledge."},{"key":"9049_CR12","doi-asserted-by":"crossref","unstructured":"Jonker, C.\u00a0M., & Treur, J. (1999). Formal analysis of models for the dynamics of trust based on experiences. In Proceedings of Multi-Agent System Engineering \u201999, vol. 1647 (pp. 221\u2013231). Springer.","DOI":"10.1007\/3-540-48437-X_18"},{"key":"9049_CR13","first-page":"83","volume":"16","author":"S. A. Kripke","year":"1963","unstructured":"Kripke, S.\u00a0A. (1963) Semantical considerations on modal logic. Acta Philosophica Fennica, 16, 83\u201394.","journal-title":"Acta Philosophica Fennica"},{"key":"9049_CR14","doi-asserted-by":"crossref","unstructured":"Liu, C. (2001). Logical foundations for reasoning about trust in secure digital communication. In Proceedings of AI2001: Advances in Artificial Intelligence. LNCS, vol. 2256 (pp. 333\u2013344). Springer.","DOI":"10.1007\/3-540-45656-2_29"},{"issue":"5\/6","key":"9049_CR15","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1006\/jsco.1996.0072","volume":"22","author":"C. Liu","year":"1996","unstructured":"Liu, C., & Orgun, M.\u00a0A. (1996). Dealing with multiple granularity of time in temporal logic programming. Journal of Symbolic Computation, 22(5\/6), 699\u2013720.","journal-title":"Journal of Symbolic Computation"},{"issue":"2","key":"9049_CR16","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1016\/S0304-3975(99)00008-0","volume":"220","author":"C. Liu","year":"1999","unstructured":"Liu, C., & Orgun, M.\u00a0A. (1999). Verification of reactive systems using temporal logic with clocks. Theoretical Computer Science, 220(2), 377\u2013408.","journal-title":"Theoretical Computer Science"},{"key":"9049_CR17","unstructured":"Liu, C., & Ozols, M.\u00a0A. (2002). Trust in secure communication systems\u2014the concept, representations, and reasoning techniques. In Proceedings of AI2002: Advances in artificial intelligence. LNCS, vol. 2557 (pp. 60\u201370). Springer."},{"key":"9049_CR18","doi-asserted-by":"crossref","unstructured":"Liu, C., Ozols, M.\u00a0A., & Orgun, M.\u00a0A. (2004). A temporalised belief logic for specifying the dynamics of trust for multi-agent systems. In Proceedings of the Ninth Asian Computer Science Conference 2004. LNCS, vol. 3321 (pp. 142\u2013156). Springer.","DOI":"10.1007\/978-3-540-30502-6_10"},{"key":"9049_CR19","unstructured":"Liu, H., Lutz, C., Milicic, M., & Wolter, F. (2006). Updating description logic aboxes. In Proceedings of International Conference of Principles of knowledge Representation and Reasoning (KR) (pp. 46\u201356)."},{"key":"9049_CR20","unstructured":"Ma, J., & Orgun, M. (2006a). Theories of trust for authentication systems. In 2nd Secure Knowledge Management Workshop (unpaginated cd-rom proceedings)."},{"issue":"3","key":"9049_CR21","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TSMCA.2006.871628","volume":"36","author":"J. Ma","year":"2006","unstructured":"Ma, J., & Orgun, M. (2006b). Trust management and trust theory revision. IEEE Transactions on Systems, Man and Cybernetics, Part A, 36(3), 451\u2013460.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A"},{"key":"9049_CR22","doi-asserted-by":"crossref","unstructured":"Ma, J., & Orgun, M. (2007). Specifying agent beliefs for authentication systems. In Proceedings of 4th European Conference on Universal Multiservice Networks, (pp. 410\u2013418). IEEE Computer Society Press.","DOI":"10.1109\/ECUMN.2007.49"},{"key":"9049_CR23","unstructured":"McCarthy, J. (1990). Formalizing common sense: Papers by John McCarthy (V.\u00a0Lifschitz). Ablex Publishing Corporation."},{"key":"9049_CR24","doi-asserted-by":"crossref","unstructured":"Meyer, T. (1999). Basic infobase change. In Proceedings of AI\u201999. LNCS, vol. 1747 (pp. 156\u2013167). Springer.","DOI":"10.1007\/3-540-46695-9_14"},{"key":"9049_CR25","unstructured":"Miller, S.\u00a0P., Neuman, C., Schiller, J.\u00a0I., & Saltzer, J.\u00a0H. (1987). Kerberos authentication and authorization system. Project Athena Technical Plan, Sect. E.2.1. MIT."},{"key":"9049_CR26","doi-asserted-by":"crossref","unstructured":"Moser, L. (1989). A logic of knowledge and belief for reasoning about computer security. In Proceedings of the Computer Security Foundations Workshop II (pp. 57\u201363). IEEE Computer Society Press.","DOI":"10.1109\/CSFW.1989.40587"},{"key":"9049_CR27","doi-asserted-by":"crossref","unstructured":"Needham, R. M., & Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. In Commun. ACM, vol. 21 (pp. 993\u2013999).","DOI":"10.1145\/359657.359659"},{"key":"9049_CR28","doi-asserted-by":"crossref","unstructured":"Oorschot, P. C.\u00a0V. (1993). Extending cryptographic logics of belief to key agreement protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, (pp. 233\u2013243). ACM Press.","DOI":"10.1145\/168588.168617"},{"key":"9049_CR29","doi-asserted-by":"crossref","unstructured":"Orgun, M.\u00a0A., Ma, J., Liu, C., & Governatori, G. (2006). Analysing stream authentication protocols in autonomous agent-based systems. In Proceedings of the 2nd International Symposium on Dependable Autonomic and Secure Computing (pp. 325\u2013332). IEEE Computer Society Press.","DOI":"10.1109\/DASC.2006.19"},{"key":"9049_CR30","doi-asserted-by":"crossref","unstructured":"Rangan, P.\u00a0V. (1988). An axiomatic basis of trust in distributed systems. In Proceedings of the 1988 IEEE computer Society Symposium on Research in Security and Privacy, (pp. 204\u2013211).","DOI":"10.1109\/SECPRI.1988.8112"},{"key":"9049_CR31","doi-asserted-by":"crossref","unstructured":"Schulte, O. (1999). Minimal belief change and pareto-optimality. In Proceedings of AI\u201999. LNCS, vol. 1747 (pp. 144\u2013155). Springer.","DOI":"10.1007\/3-540-46695-9_13"},{"key":"9049_CR32","unstructured":"Steiner, J.\u00a0G., Neuman, B.\u00a0C., Schiller, J. (1988). Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 Usenix Conference, (pp. 191\u2013202)."},{"key":"9049_CR33","doi-asserted-by":"crossref","unstructured":"Syverson, P.\u00a0F., & Oorschot, P. C. V. (1996). A Unified Cryptographic Protocol Logic. In NRL Publication. Naval Research Lab.","DOI":"10.21236\/ADA464967"},{"key":"9049_CR34","doi-asserted-by":"crossref","unstructured":"Wedel, G., & Kessler, V. (1996). Formal semantics for authentication logics. In Proceedings of ESORICS\u201996. LNCS, vol. 1146 (pp. 219\u2013241). Springer.","DOI":"10.1007\/3-540-61770-1_39"},{"key":"9049_CR35","doi-asserted-by":"crossref","unstructured":"Wen, J., Zhang, M., & Li, X. (2005) The study on the application of ban logic in formal analysis of authentication protocols. In Proceedings of the 7th International Conference on Electronic Commerce (pp. 744\u2013747). ACM Press.","DOI":"10.1145\/1089551.1089685"},{"key":"9049_CR36","doi-asserted-by":"crossref","unstructured":"Yahalom, R., Klein, B., & Beth, T. (1993). Trust relationships\u00a0in secure systems\u2014a distributed authentication perspective. In Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy (pp. 150\u2013164).","DOI":"10.1109\/RISP.1993.287635"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-007-9049-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-007-9049-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-007-9049-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:36:08Z","timestamp":1559248568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-007-9049-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,4]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["9049"],"URL":"https:\/\/doi.org\/10.1007\/s10796-007-9049-0","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,10,4]]}}}