{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:17:27Z","timestamp":1740201447233,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1109\/icstw.2010.54","type":"proceedings-article","created":{"date-parts":[[2010,5,26]],"date-time":"2010-05-26T16:54:10Z","timestamp":1274892850000},"page":"361-370","source":"Crossref","is-referenced-by-count":24,"title":["Model-Checking Driven Security Testing of Web-Based Applications"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Armando","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Carbone","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Compagna","sequence":"additional","affiliation":[]},{"given":"Keqin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Pellegrino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988756"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1147\/sj.412.0228"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2004.1314722"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181790"},{"key":"ref14","first-page":"284","article-title":"Model-based security vulnerability testing","volume":"0","author":"salas","year":"2007","journal-title":"Australian Software Engineering Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242663"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2008.11.008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2008.7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04468-7_19"},{"key":"ref19","article-title":"A taxonomy of model-based testing","author":"utting","year":"2006","journal-title":"Tech Rep 04\/2006"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/11513988_27","article-title":"The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications","author":"armando","year":"2005","journal-title":"Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05)"},{"key":"ref3","article-title":"A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols","author":"chevalier","year":"2004","journal-title":"Proc SAPS'04"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/888251.888252"},{"journal-title":"Modelling and Analysis of Security Protocols","year":"2000","author":"ryan","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1103022.1103035"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"16","DOI":"10.26636\/jtit.2002.4.148","article-title":"Capsl and mucapsl","volume":"4","author":"millen","year":"2002","journal-title":"Journal of Telecommunications and Information Technology"},{"journal-title":"Security Assertion Markup Language V2 0 Technical Overview","year":"2008","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1456396.1456397"},{"key":"ref9","first-page":"428","article-title":"Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario","author":"backes","year":"2006","journal-title":"Proceedings of FOS-SACS '06 ser LNCS 3921"}],"event":{"name":"2010 IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW)","start":{"date-parts":[[2010,4,6]]},"location":"Paris, France","end":{"date-parts":[[2010,4,10]]}},"container-title":["2010 Third International Conference on Software Testing, Verification, and Validation Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5463512\/5463636\/05463670.pdf?arnumber=5463670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:27:38Z","timestamp":1740119258000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5463670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icstw.2010.54","relation":{},"subject":[],"published":{"date-parts":[[2010,4]]}}}