{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:33Z","timestamp":1750308153536,"version":"3.41.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2006,6,1]],"date-time":"2006-06-01T00:00:00Z","timestamp":1149120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2006,6]]},"abstract":"<jats:p>Model checking is an effective component for performing online transactions that build customer trust and confidence.<\/jats:p>","DOI":"10.1145\/1132469.1132474","type":"journal-article","created":{"date-parts":[[2006,7,25]],"date-time":"2006-07-25T14:14:26Z","timestamp":1153836866000},"page":"97-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["The application of model checking for securing e-commerce transactions"],"prefix":"10.1145","volume":"49","author":[{"given":"Bonnie Brinton","family":"Anderson","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"James V.","family":"Hansen","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Paul Benjamin","family":"Lowry","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Scott L.","family":"Summers","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]}],"member":"320","published-online":{"date-parts":[[2006,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2003.12.001"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.843181"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of Advances in Cryptology","author":"Chaum D.","year":"1989","unstructured":"Chaum , D. , Fiat , A. , and Naor , M . Untraceable electronic cash . In Proceedings of Advances in Cryptology ( Santa Barbara, CA , 1989 ), 319--327.]] Chaum, D., Fiat, A., and Naor, M. Untraceable electronic cash. In Proceedings of Advances in Cryptology (Santa Barbara, CA, 1989), 319--327.]]"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of The 1st USENIX Workshop in Electronic Commerce","author":"Cox B.","year":"1995","unstructured":"Cox , B. , Tygar , J. , and Sirbu , M . NetBill security and transaction protocol . In Proceedings of The 1st USENIX Workshop in Electronic Commerce ( New York, NY , 1995 ), 77--88.]] Cox, B., Tygar, J., and Sirbu, M. NetBill security and transaction protocol. In Proceedings of The 1st USENIX Workshop in Electronic Commerce (New York, NY, 1995), 77--88.]]"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267167.1267177"},{"key":"e_1_2_1_6_1","first-page":"147","article-title":"Breaking and fixing the Needham-Schroeder public-key protocol using FDR","author":"Lowe G","year":"1996","unstructured":"Lowe , G . Breaking and fixing the Needham-Schroeder public-key protocol using FDR . In Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems ( 1996 ), 147 -- 166 .]] Lowe, G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems (1996), 147--166.]]","journal-title":"Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems ("},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/518046.885188"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646118.680122"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884230"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646202.681991"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 24th International Conference on Very Large Databases","author":"Tygar J.D.","year":"1998","unstructured":"Tygar , J.D. Atomicity versus anonymity: Distributed transactions for electronic commerce . In Proceedings of the 24th International Conference on Very Large Databases ( New York, NY , 1998 ).]] Tygar, J.D. Atomicity versus anonymity: Distributed transactions for electronic commerce. In Proceedings of the 24th International Conference on Very Large Databases (New York, NY, 1998).]]"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.876292"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1132469.1132474","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1132469.1132474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:50Z","timestamp":1750263530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1132469.1132474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6]]},"references-count":12,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2006,6]]}},"alternative-id":["10.1145\/1132469.1132474"],"URL":"https:\/\/doi.org\/10.1145\/1132469.1132474","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2006,6]]},"assertion":[{"value":"2006-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}