{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:14:23Z","timestamp":1725534863143},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/securware.2008.60","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T16:43:14Z","timestamp":1221583394000},"page":"80-87","source":"Crossref","is-referenced-by-count":0,"title":["Proving Trust Locally"],"prefix":"10.1109","author":[{"given":"Anders Moen","family":"Hagalisletto","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"1991","author":"shapiro","journal-title":"Foundations without Foundationalism A Case Study for Second Order Logic","key":"13"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-1998-61-205","article-title":"the inductive approach to verifying cryptographic protocols","author":"paulson","year":"1998","journal-title":"Computers & Security"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/0004-3702(87)90003-8"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/77648.77649"},{"key":"2","first-page":"103","article-title":"expressions of confidentiality policies with deontic logic","author":"bieber","year":"1993","journal-title":"Deontic Logic in Computer Science Normative System Specification"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/155183.155225"},{"key":"10","first-page":"147","article-title":"breaking and fixing the needham-schroeder public-key protocol using fdr","author":"lowe","year":"1996","journal-title":"Proc of the Second Int Workshop on Tools and Algorithms for Construction and Analysis of Systems"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/146937.146940"},{"year":"0","key":"6"},{"year":"1995","author":"moses","journal-title":"Reasoning About Knowledge","key":"5"},{"key":"4","article-title":"logical omniscience in the semantics of ban logic","author":"cohen","year":"2005","journal-title":"Proc FCS'05"},{"key":"9","article-title":"a formal language for specifying security properties","author":"hagalisletto","year":"2004","journal-title":"Proc for the Workshop on Specification and Automated Processing of Security Requirements - SAPS'04"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/ARES.2007.46"}],"event":{"name":"2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE)","start":{"date-parts":[[2008,8,25]]},"location":"Cap Esterel, France","end":{"date-parts":[[2008,8,31]]}},"container-title":["2008 Second International Conference on Emerging Security Information, Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4622544\/4622545\/04622565.pdf?arnumber=4622565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:47:01Z","timestamp":1497772021000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4622565\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/securware.2008.60","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}