{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:27:06Z","timestamp":1729614426680,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/icdew.2007.4401010","type":"proceedings-article","created":{"date-parts":[[2007,12,18]],"date-time":"2007-12-18T14:56:26Z","timestamp":1197989786000},"page":"307-314","source":"Crossref","is-referenced-by-count":1,"title":["The rigorous implementation of a fair exchange protocol for non-repudiable Web service interactions - a case study"],"prefix":"10.1109","author":[{"given":"N.","family":"Cook","sequence":"first","affiliation":[]},{"given":"P.","family":"Robinson","sequence":"additional","affiliation":[]},{"given":"S.","family":"Shrivastava","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843006001499"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-639-6.ch004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/232335.232338"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1006\/jnca.1997.0056"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/1097-024X(200009)30:11<1203::AID-SPE338>3.3.CO;2-E"},{"journal-title":"Web Services Security SOAP Message Security 1 0","year":"2004","author":"nadalin","key":"ref15"},{"journal-title":"Digital Signature Service Core Protocols Elements and Bindings OASIS Committee Working Draft 26","year":"2004","author":"perrin","key":"ref16"},{"journal-title":"XML Key Management Specification (XKMS 2 0) W3C Recommendation","year":"2005","author":"hallam-baker","key":"ref17"},{"journal-title":"IBM Microsoft and TIBCO Web Services Reliable Messaging Protocol (WS-Reliable Messaging)","year":"2005","key":"ref18"},{"journal-title":"NunniSoft Nunni FSM Generator","year":"2004","key":"ref19"},{"journal-title":"Proc Workshop on Specification and Automated Processing of Security Requirements","article-title":"A High-Level Protocol Specification Language for Industrial Security-Sensitive Protocols","year":"2004","author":"chevalier","key":"ref28"},{"journal-title":"Technion Israel Institute of Technology","article-title":"Relations Among Public Key Signature Systems, TR CS175","year":"1980","author":"even","key":"ref4"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1109\/AINA.2005.128","article-title":"Automatic Generation of the C# Code for Security Protocols Verified with Casper\/FDR","author":"jeon","year":"2005","journal-title":"Proc IEEE Int Conf on Advanced Inf Networking and Applications (AINA)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(02)00049-X"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596779"},{"journal-title":"Proc Automated Reasoning for Security Protocol Analysis (ARSPA)","article-title":"Web Services Security: a preliminary study using Casper and FDR","year":"2004","author":"kleiner","key":"ref29"},{"journal-title":"TR TUD-BS-1999-02 Dept of Comp Science TU Darmstadt","article-title":"On the impossibility of fair exchange without a trusted third party","year":"1999","author":"pagnia","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/11513988_27","article-title":"The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications","author":"armando","year":"2005","journal-title":"Proc 17th Int Conf on Comp Aided Verification (CAV)"},{"journal-title":"Proc Internet Soc Symp on Network and Dist Syst Security (NDSS)","article-title":"Analysis of a Fair Exchange Protocol","year":"2000","author":"shmatikov","key":"ref7"},{"journal-title":"Non-repudiation in Electronic Commerce Artech House Computer Security Series","year":"2001","author":"zhou","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311931"},{"journal-title":"RosettaNet eBusiness Standards for the Global Supply Chain","year":"2005","key":"ref1"},{"journal-title":"Language (XPath) W3C Recommendation","year":"1999","author":"clark","key":"ref20"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44585-4_21","article-title":"AGVI - Automatic Generation, Verification and Implementation of Security Protocols","volume":"2102","author":"song","year":"2001","journal-title":"Proc 13th Conf on Computer Aided Verification"},{"journal-title":"A Framework for the Rigorous Implementation of Security Protocols CS-TR 937 School of Comp","year":"2005","author":"robinson","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2004.1283943"},{"journal-title":"COSP-J A Compiler for Security Protocols MSc Dissertation Comp Lab Oxford University","year":"2003","author":"didelot","key":"ref23"},{"journal-title":"Proc 7th IEEE Int Symp on Comp and Comm","article-title":"Automatic Implementation System of Security Protocols Based on Formal Description Techniques","year":"2004","author":"mengual","key":"ref26"},{"journal-title":"Proc IFIP Workshop on Certification and Security in Inter-Organizational E-Services (CSES)","article-title":"Generating Network Security Protocol Implementations from Formal Specifications","year":"2004","author":"tobler","key":"ref25"}],"event":{"name":"2007 IEEE 23rd International Conference on Data Engineering Workshop","start":{"date-parts":[[2007,4,17]]},"location":"Istanbul","end":{"date-parts":[[2007,4,20]]}},"container-title":["2007 IEEE 23rd International Conference on Data Engineering Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4400942\/4400943\/04401010.pdf?arnumber=4401010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T22:15:50Z","timestamp":1557094550000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4401010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icdew.2007.4401010","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}