{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T17:52:39Z","timestamp":1648749159977},"reference-count":10,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2006,4]]},"abstract":"<jats:p> Security is critical in a home gateway environment. Robust secure mechanisms must be put in place for protecting information transferred through a central location. In considering characteristics for the home gateway environment, this paper proposes a bundle authentication mechanism. We designed the exchange mechanism for transferring a shared secret key. This transports a service bundle safely in the bootstrapping step, by recognizing and initializing various components. In this paper, we propose a bundle authentication mechanism based on a MAC that uses a shared secret key created in the bootstrapping step. In addition, we verify the safety of the key exchange mechanism and bundle authentication mechanism using BAN Logic. From the verified result, we achieved goals of authentication. That is, the operator can trust the bundle provided by the service provider. The user who uses the service gateway can also express trust and use the bundle provided by the operator. <\/jats:p>","DOI":"10.1142\/s0218194006002793","type":"journal-article","created":{"date-parts":[[2006,4,25]],"date-time":"2006-04-25T13:55:25Z","timestamp":1145973325000},"page":"153-173","source":"Crossref","is-referenced-by-count":2,"title":["FORMAL VERIFICATION OF BUNDLE AUTHENTICATION MECHANISM IN OSGi SERVICE PLATFORM: BAN LOGIC"],"prefix":"10.1142","volume":"16","author":[{"given":"YOUNG-GAB","family":"KIM","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University, 1, 5-ga, Anam-dong, SungBuk-gu, 136-701, Seoul, Korea"}]},{"given":"CHANG-JOO","family":"MOON","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Konkuk University, 322 Danwol-dong, Chungju-si, Chungcheongbuk-do, 380-701, Korea"}]},{"given":"DONGWON","family":"JEONG","sequence":"additional","affiliation":[{"name":"Department of Informatics &amp; Statistics, Kunsan National University, San 68, Miryong-dong, Gunsan, Jeolabuk-do, 573-701, Korea"}]},{"given":"DOO-KWON","family":"BAIK","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Korea University, 1, 5-ga, Anam-dong, SungBuk-gu, 136-701, Seoul, Korea"}]}],"member":"219","published-online":{"date-parts":[[2011,11,21]]},"reference":[{"key":"rf2","volume-title":"A Survey of Authentication Protocol Literature","author":"Clark J.","year":"1997"},{"key":"rf3","volume-title":"A Survey of Public Key Infrastructures","author":"Branchaud M.","year":"1997"},{"key":"rf6","unstructured":"W.\u00a0Stallings, Cryptography and Network Security (Pearson Education, 2002)\u00a0pp. 312\u2013378."},{"key":"rf7","series-title":"Lecture Notes in Computer Science (LNCS)","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/978-3-540-24571-1_11","volume":"2973","author":"Kim Y.","year":"2004"},{"key":"rf8","series-title":"Lecture Notes in Computer Science (LNCS)","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1007\/978-3-540-27772-9_73","volume":"3129","author":"Kim Y.","year":"2004"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"rf11","volume-title":"Practical Cryptography for Data Internetworks","author":"Stallings W.","year":"1996"},{"key":"rf14","volume-title":"Professional Java Security","author":"Garms J.","year":"2001"},{"key":"rf15","volume-title":"Java 2 Network Security","author":"Pistoia M.","year":"1999"},{"key":"rf16","volume-title":"Programming Open Service Gateways with Java Embedded Server Technology","author":"Chen K.","year":"2001"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194006002793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T16:14:20Z","timestamp":1565194460000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194006002793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4]]},"references-count":10,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2011,11,21]]},"published-print":{"date-parts":[[2006,4]]}},"alternative-id":["10.1142\/S0218194006002793"],"URL":"https:\/\/doi.org\/10.1142\/s0218194006002793","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,4]]}}}