{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:29:53Z","timestamp":1739338193360,"version":"3.37.0"},"reference-count":29,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1016\/j.cose.2009.08.001","type":"journal-article","created":{"date-parts":[[2009,8,14]],"date-time":"2009-08-14T09:34:51Z","timestamp":1250242491000},"page":"302-314","source":"Crossref","is-referenced-by-count":15,"title":["Provably correct Java implementations of Spi Calculus security protocols specifications"],"prefix":"10.1016","volume":"29","author":[{"given":"Alfredo","family":"Pironti","sequence":"first","affiliation":[]},{"given":"Riccardo","family":"Sisto","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1\u20132","key":"10.1016\/j.cose.2009.08.001_bib5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.scico.2005.02.002","article-title":"Computer-assisted verification of a protocol for certified email","volume":"58","author":"Abadi","year":"2005","journal-title":"Science of Computer Programming"},{"key":"10.1016\/j.cose.2009.08.001_bib1","article-title":"A calculus for cryptographic protocols the spi calculus","volume":"149","author":"Abadi","year":"1998","journal-title":"Digital SRC Research Report"},{"issue":"3","key":"10.1016\/j.cose.2009.08.001_bib4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1266977.1266978","article-title":"Just fast keying in the pi calculus","volume":"10","author":"Abadi","year":"2007","journal-title":"ACM Transactions on Information and System Security"},{"key":"10.1016\/j.cose.2009.08.001_bib29","doi-asserted-by":"crossref","unstructured":"Backes M, Pfitzmann B, Waidner M. A composable cryptographic library with nested operations. In: ACM Conference on Computer and Communications Security; 2003. pp. 220\u201330.","DOI":"10.1145\/948138.948140"},{"year":"2006","series-title":"Web services policy 1.2-framework (WS-policy)","author":"Bajaj","key":"10.1016\/j.cose.2009.08.001_bib17"},{"year":"2006","series-title":"Web services policy 1.2-attachment (WS-policyattachment)","author":"Bajaj","key":"10.1016\/j.cose.2009.08.001_bib18"},{"key":"10.1016\/j.cose.2009.08.001_bib19","doi-asserted-by":"crossref","unstructured":"Bhargavan K, Fournet C, Gordon AD, O'Shea G. An advisor for web services security policies. In: Workshop on Secure web services; 2005. pp. 1\u20139.","DOI":"10.1145\/1103022.1103024"},{"key":"10.1016\/j.cose.2009.08.001_bib7","doi-asserted-by":"crossref","unstructured":"Bhargavan K, Fournet C, Gordon AD, Tse S. Verified interoperable implementations of security protocols. In: Computer Security Foundations Workshop; 2006a. pp. 139\u201352.","DOI":"10.1007\/11841197_6"},{"key":"10.1016\/j.cose.2009.08.001_bib10","doi-asserted-by":"crossref","unstructured":"Bhargavan K, Fournet C, Gordon AD. Verified reference implementations of WS-security protocols. In: Web Services and Formal Methods; 2006b. pp. 88\u2013106.","DOI":"10.1007\/11841197_6"},{"year":"2003","series-title":"MJ: an imperative core calculus for Java and Java with effects","author":"Bierman","key":"10.1016\/j.cose.2009.08.001_bib27"},{"key":"10.1016\/j.cose.2009.08.001_bib3","doi-asserted-by":"crossref","unstructured":"Blanchet B. An efficient cryptographic protocol verifier based on prolog rules. In: IEEE Computer Security Foundations Workshop; 2001. pp. 82\u201396.","DOI":"10.1109\/CSFW.2001.930138"},{"issue":"2","key":"10.1016\/j.cose.2009.08.001_bib6","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","article-title":"On the security of public key protocols","volume":"29","author":"Dolev","year":"1983","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"10.1016\/j.cose.2009.08.001_bib2","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1145\/941566.941570","article-title":"Automatic testing equivalence verification of spi calculus specifications","volume":"12","author":"Durante","year":"2003","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1016\/j.cose.2009.08.001_bib9","doi-asserted-by":"crossref","unstructured":"Goubault-Larrecq J, Parrennes F. Cryptographic protocol analysis on real C code. In: Verification, Model Checking, and Abstract Interpretation; 2005. pp. 363\u201379.","DOI":"10.1007\/978-3-540-30579-8_24"},{"key":"10.1016\/j.cose.2009.08.001_bib16","doi-asserted-by":"crossref","unstructured":"Hubbers E, Oostdijk M, Poll E. Implementing a formally verifiable security protocol in java card. In: Security in Pervasive Computing; 2003. pp. 213\u201326.","DOI":"10.1007\/978-3-540-39881-3_19"},{"issue":"1\u20133","key":"10.1016\/j.cose.2009.08.001_bib23","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/S0304-3975(03)00325-6","article-title":"A generic type system for the pi-calculus","volume":"311","author":"Igarashi","year":"2004","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"10.1016\/j.cose.2009.08.001_bib15","unstructured":"Jeon CW, Kim IG, Choi JY. Automatic generation of the C# code for security protocols verified with casper\/FDR. In: International Conference on Advanced Information Networking and Applications; 2005. pp. 507\u201310."},{"key":"10.1016\/j.cose.2009.08.001_bib8","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens J. Verification of low-level crypto-protocol implementations using automated theorem proving. In: Formal Methods and Models for Co-Design; 2005. pp. 89\u201398.","DOI":"10.1109\/MEMCOD.2005.1487898"},{"issue":"1","key":"10.1016\/j.cose.2009.08.001_bib21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","article-title":"A calculus of mobile processes, parts I and II","volume":"100","author":"Milner","year":"1992","journal-title":"Information and Computation"},{"year":"2006","series-title":"SOAP message security 1.1 (WS-security 2004)","author":"Nadalin","key":"10.1016\/j.cose.2009.08.001_bib20"},{"year":"2002","series-title":"Types and programming languages","author":"Pierce","key":"10.1016\/j.cose.2009.08.001_bib24"},{"key":"10.1016\/j.cose.2009.08.001_bib12","doi-asserted-by":"crossref","unstructured":"Pironti A, Sisto R. An experiment in interoperable cryptographic protocol implementation using automatic code generation. In: IEEE Symposium on Computers and Communications; 2007. pp. 839\u201344.","DOI":"10.1109\/ISCC.2007.4381508"},{"key":"10.1016\/j.cose.2009.08.001_bib14","doi-asserted-by":"crossref","unstructured":"Pironti A, Sisto R. Formally sound refinement of Spi Calculus protocol specifications into Java code. In: IEEE High Assurance Systems Engineering Symposium; 2008a. pp. 241\u201350.","DOI":"10.1109\/HASE.2008.27"},{"key":"10.1016\/j.cose.2009.08.001_bib25","doi-asserted-by":"crossref","unstructured":"Pironti A, Sisto R. Soundness conditions for message encoding abstractions in formal security protocol models. In: International Conference on Availability, Reliability and Security; 2008b. pp. 72\u20139.","DOI":"10.1109\/ARES.2008.30"},{"author":"Pironti","key":"10.1016\/j.cose.2009.08.001_bib22"},{"key":"10.1016\/j.cose.2009.08.001_bib11","doi-asserted-by":"crossref","unstructured":"Pozza D, Sisto R, Durante L. Spi2java: automatic cryptographic protocol java code generation from spi calculus. In: International Conference on Advanced Information Networking and Applications; 2004. pp. 400\u201305.","DOI":"10.1109\/AINA.2004.1283943"},{"issue":"2","key":"10.1016\/j.cose.2009.08.001_bib28","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/S1571-0661(04)81048-X","article-title":"Formalizing java-MaC","volume":"89","author":"Sammapun","year":"2003","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"2\u20133","key":"10.1016\/j.cose.2009.08.001_bib26","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.tcs.2004.11.013","article-title":"ASM refinement and generalizations of forward simulation in data refinement: a comparison","volume":"336","author":"Schellhorn","year":"2005","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/j.cose.2009.08.001_bib13","unstructured":"Tobler B, Hutchison A. Generating network security protocol implementations from formal specifications. In: Certification and Security in Inter-Organizational E-Services, Toulouse, France; 2004."}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000832?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000832?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T19:09:15Z","timestamp":1739300955000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404809000832"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["S0167404809000832"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2009.08.001","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2010,5]]}}}