{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T15:19:31Z","timestamp":1746803971587,"version":"3.40.5"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"This work is funded by the National ICT R D fund under the project CDACDEA http www ictrdf org pkindexphp component tprojectsproject19"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1109\/tifs.2016.2561909","type":"journal-article","created":{"date-parts":[[2016,5,3]],"date-time":"2016-05-03T18:16:52Z","timestamp":1462299412000},"page":"1-1","source":"Crossref","is-referenced-by-count":7,"title":["Formal Verification of the xDAuth Protocol"],"prefix":"10.1109","author":[{"given":"Quratulain","family":"Alam","sequence":"first","affiliation":[]},{"given":"Saher","family":"Tabbasum","sequence":"additional","affiliation":[]},{"given":"Saif","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Masoom","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Tamleek","family":"Tanveer","sequence":"additional","affiliation":[]},{"given":"Adnan","family":"Akhunzada","sequence":"additional","affiliation":[]},{"given":"Samee","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Athanasios","family":"Vasilakos","sequence":"additional","affiliation":[]},{"given":"Rajkumar","family":"Buyya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"Formal analysis of Facebook Connect single sign-on authentication protocol","author":"miculan","year":"2011","journal-title":"Proc SOFSEM"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61042-1_43"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2012-0461"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/itnow\/bwt025"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-65306-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2458862"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046727"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2013.6625487"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2517881.2517891"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"journal-title":"Web Services Security (WSS) OASIS TC Homepage","year":"2016","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.06.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1237500.1237501"},{"year":"2016","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"article-title":"Verification conditions for source-level imperative programs","year":"2008","author":"frade","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10452-7_3"},{"journal-title":"SMT-LIB","year":"2015","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2013.3"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1990.131379"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.43"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1049\/el.2012.2310"},{"key":"ref56","first-page":"1","article-title":"A methodology for OSPF routing protocol verification","author":"malik","year":"2012","journal-title":"Proc 12th Int Conf Scalable Comput Commun (ScalCom)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2446458"},{"journal-title":"Model checking","year":"1999","author":"clarke","key":"ref54"},{"key":"ref53","article-title":"Design and validation of a general security model with the alloy analyzer","author":"chen","year":"2006","journal-title":"Proc ACM SIGSOFT 1st Alloy Workshop"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.59"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2012.3203"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998447"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081073"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.10.009"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930138"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30579-8_24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2009.2018627"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601329"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.27"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.37"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"year":"2016","key":"ref6"},{"journal-title":"Security for Web Services and Service-Oriented Architectures","year":"2009","author":"bertino","key":"ref5"},{"key":"ref8","volume":"28","author":"hammer","year":"2012","journal-title":"IETF The OAuth2 0 Authorization Protocol Draft"},{"key":"ref7","first-page":"12","article-title":"Federated security: The shibboleth approach","volume":"24","author":"morgan","year":"2004","journal-title":"Educause Quarterly ERIC"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_27"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179532"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2011.6139111"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_48"},{"article-title":"Formal verification of cross-domain access control policies using model checking","year":"2011","author":"reynolds","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1202"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1993.246631"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030120"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.11.052"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/4358835\/07464291.pdf?arnumber=7464291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:11:20Z","timestamp":1642003880000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7464291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2561909","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2016]]}}}