{"id":"https://openalex.org/W2128844732","doi":"https://doi.org/10.1016/j.entcs.2004.05.020","title":"Metareasoning about Security Protocols using Distributed Temporal Logic","display_name":"Metareasoning about Security Protocols using Distributed Temporal Logic","publication_year":2005,"publication_date":"2005-03-01","ids":{"openalex":"https://openalex.org/W2128844732","doi":"https://doi.org/10.1016/j.entcs.2004.05.020","mag":"2128844732"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2004.05.020","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.entcs.2004.05.020","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006730208","display_name":"Carlos Caleiro","orcid":"https://orcid.org/0000-0001-5587-6585"},"institutions":[{"id":"https://openalex.org/I4210154254","display_name":"Instituto Superior de Tecnologias Avan\u00e7adas","ror":"https://ror.org/04hzbg791","country_code":"PT","type":"education","lineage":["https://openalex.org/I4210154254"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Carlos Caleiro","raw_affiliation_strings":["CLC, Department of Mathematics, IST, Lisbon, Portugal#TAB#"],"affiliations":[{"raw_affiliation_string":"CLC, Department of Mathematics, IST, Lisbon, Portugal#TAB#","institution_ids":["https://openalex.org/I4210154254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101515402","display_name":"Luca Vigan\u00f2","orcid":"https://orcid.org/0000-0001-9916-271X"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"funder","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Luca Vigan\u00f2","raw_affiliation_strings":["Department of Computer Science ETH Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025344654","display_name":"David Basin","orcid":"https://orcid.org/0000-0003-2952-939X"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"funder","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"David Basin","raw_affiliation_strings":["Department of Computer Science ETH Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.502,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":31,"citation_normalized_percentile":{"value":0.930769,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":90},"biblio":{"volume":"125","issue":"1","first_page":"67","last_page":"89"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9946,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9886,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.468002}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.8516963},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82498455},{"id":"https://openalex.org/C25016198","wikidata":"https://www.wikidata.org/wiki/Q781833","display_name":"Temporal logic","level":2,"score":0.7649561},{"id":"https://openalex.org/C11648818","wikidata":"https://www.wikidata.org/wiki/Q2403081","display_name":"Temporal logic of actions","level":4,"score":0.623515},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.61618954},{"id":"https://openalex.org/C4777664","wikidata":"https://www.wikidata.org/wiki/Q1536492","display_name":"Linear temporal logic","level":2,"score":0.59199506},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5849782},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.52412397},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.468002},{"id":"https://openalex.org/C102993220","wikidata":"https://www.wikidata.org/wiki/Q387196","display_name":"Description logic","level":2,"score":0.4648598},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38074458},{"id":"https://openalex.org/C162670838","wikidata":"https://www.wikidata.org/wiki/Q6057295","display_name":"Interval temporal logic","level":3,"score":0.34008464},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2004.05.020","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.5832","pdf_url":"http://www.avispa-project.org/papers/metareasoning-security-entcs05.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.entcs.2004.05.020","pdf_url":null,"source":{"id":"https://openalex.org/S50368787","display_name":"Electronic Notes in Theoretical Computer Science","issn_l":"1571-0661","issn":["1571-0661"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.54}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W1569881051","https://openalex.org/W1577647570","https://openalex.org/W1588668163","https://openalex.org/W1619409532","https://openalex.org/W1623229847","https://openalex.org/W1836114257","https://openalex.org/W1944323241","https://openalex.org/W1987035270","https://openalex.org/W1987574012","https://openalex.org/W2007164449","https://openalex.org/W2026388404","https://openalex.org/W2100317906","https://openalex.org/W2104655005","https://openalex.org/W2120926795","https://openalex.org/W2126338744","https://openalex.org/W2131679541","https://openalex.org/W2133126578","https://openalex.org/W2145415641","https://openalex.org/W2155032609","https://openalex.org/W2164587664","https://openalex.org/W2177212599","https://openalex.org/W2505960745","https://openalex.org/W2613212056","https://openalex.org/W2914421362","https://openalex.org/W3162919972"],"related_works":["https://openalex.org/W4360918564","https://openalex.org/W2395144056","https://openalex.org/W2349696246","https://openalex.org/W2180066852","https://openalex.org/W2128844732","https://openalex.org/W2117107687","https://openalex.org/W2114609077","https://openalex.org/W2051068608","https://openalex.org/W1546948343","https://openalex.org/W1513903619"],"abstract_inverted_index":{"We":[0],"introduce":[1],"a":[2,32,50,76],"version":[3],"of":[4,15,45,52,68],"distributed":[5,46],"temporal":[6],"logic":[7,26,58],"for":[8,36],"rigorously":[9],"formalizing":[10,37],"and":[11,19,30,42,64,71],"proving":[12],"metalevel":[13],"properties":[14,44],"different":[16,69],"protocol":[17,81],"models,":[18],"establishing":[20],"relationships":[21],"between":[22],"models.":[23],"The":[24],"resulting":[25],"is":[27],"quite":[28],"expressive":[29],"provides":[31],"natural,":[33],"intuitive":[34],"language":[35],"both":[38],"local":[39],"(agent":[40],"specific)":[41],"global":[43],"communicating":[47],"processes.":[48],"Through":[49],"sequence":[51],"examples,":[53],"we":[54],"show":[55],"how":[56],"this":[57],"may":[59],"be":[60],"applied":[61],"to":[62],"formalize":[63],"establish":[65],"the":[66],"correctness":[67],"modeling":[70],"simplification":[72],"techniques,":[73],"which":[74],"play":[75],"role":[77],"in":[78],"building":[79],"effective":[80],"tools.":[82]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2128844732","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-04-19T06:27:01.033507","created_date":"2016-06-24"}