{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:26:45Z","timestamp":1729643205052,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icsmc.2010.5641807","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T16:35:53Z","timestamp":1291134953000},"page":"350-357","source":"Crossref","is-referenced-by-count":0,"title":["The use of system security description method in security design assement: A case study"],"prefix":"10.1109","author":[{"given":"Tsukasa","family":"Maeda","sequence":"first","affiliation":[]},{"given":"Masahito","family":"Kurihara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Proceedings of the 10th IEEE Computer Security Foundations Workshop","article-title":"Verifying authentication protocols with CSP","year":"1997","key":"ref10"},{"key":"ref11","first-page":"1","article-title":"Mathematical models of computer security","year":"2001","journal-title":"Foundations of Security Analysis and Design LNCS 2171"},{"key":"ref12","first-page":"191","volume":"7","year":"1999","journal-title":"Strand spaces Proving security protocol correct Journal of Computer Security"},{"key":"ref13","first-page":"325","article-title":"Trust management in Strand Spaces: A Rely-Guarantee method","year":"2004","journal-title":"Proceedings of the European Symposium on Programming (ESOP '04) LNCS 2986"},{"key":"ref14","first-page":"150","article-title":"Trust relationships in secure systems - A distributed authentication perspective","year":"1993","journal-title":"Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy"},{"key":"ref15","first-page":"187","article-title":"Towards development of secure systems using UMLsec","year":"2001","journal-title":"Fundamental Approaches to Software Engineering (FASE\/ETAPS 2001) LNCS 2029"},{"journal-title":"Security Quality Requirements Engineering (SQUARE) Methodology (CMU\/SEI-2005-TR009)","year":"2005","key":"ref16"},{"journal-title":"Technical Report A970","article-title":"Structured semantics for the CORAS security risk modelling language","year":"2007","key":"ref17"},{"journal-title":"Security techniques Code of practice for information security management","year":"0","key":"ref4"},{"journal-title":"The Kerberos Network Authentication Service (V5)","year":"2005","key":"ref3"},{"journal-title":"Electronic Authentication Guideline","year":"2008","key":"ref6"},{"journal-title":"Recommendation for Key Management - Part I General","year":"2006","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"journal-title":"Proc Symp Network and Distributed System Security","article-title":"The perils of unauthenticated encryption: Kerberos Version 4","year":"2004","key":"ref7"},{"journal-title":"The TLS Protocol Version 1 0","year":"1999","key":"ref2"},{"journal-title":"A method of describing structure of system security based on trust and authentication unpublished","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1098\/rspa.1989.0125","article-title":"A Logic of authentication","volume":"426","year":"1989","journal-title":"Proceedings of the Royal Society Series A"}],"event":{"name":"2010 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2010,10,10]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2010,10,13]]}},"container-title":["2010 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629466\/5641665\/05641807.pdf?arnumber=5641807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:42:48Z","timestamp":1497876168000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5641807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2010.5641807","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}