{"id":"https://openalex.org/W2910561313","doi":"https://doi.org/10.1109/atnac.2018.8615367","title":"Experiments and Proofs in Web-service Security","display_name":"Experiments and Proofs in Web-service Security","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2910561313","doi":"https://doi.org/10.1109/atnac.2018.8615367","mag":"2910561313"},"language":"en","primary_location":{"id":"doi:10.1109/atnac.2018.8615367","is_oa":false,"landing_page_url":"https://doi.org/10.1109/atnac.2018.8615367","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 28th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018860992","display_name":"Dawood Sheniar","orcid":null},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Dawood Sheniar","raw_affiliation_strings":["Faculty of HES, University of Southern Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of HES, University of Southern Queensland, Australia","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069557219","display_name":"Nabeel Hadaad","orcid":null},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nabeel Hadaad","raw_affiliation_strings":["Faculty of HES, University of Southern Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of HES, University of Southern Queensland, Australia","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023193573","display_name":"David Mart\u00edn","orcid":"https://orcid.org/0000-0003-0397-0769"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"David Martin","raw_affiliation_strings":["Faculty of HES, University of Southern Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of HES, University of Southern Queensland, Australia","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071557744","display_name":"Ron Addie","orcid":"https://orcid.org/0000-0002-6664-8462"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ron Addie","raw_affiliation_strings":["Faculty of HES, University of Southern Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of HES, University of Southern Queensland, Australia","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002092753","display_name":"Shahir Abdullah","orcid":null},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shahab Abdullah","raw_affiliation_strings":["Open Access College, University of Southern Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"Open Access College, University of Southern Queensland, Australia","institution_ids":["https://openalex.org/I185523456"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5018860992"],"corresponding_institution_ids":["https://openalex.org/I185523456"],"apc_list":null,"apc_paid":null,"fwci":0.8223,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.82992416,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"50","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7633587121963501},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7200523614883423},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6787340641021729},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5951281785964966},{"id":"https://openalex.org/keywords/reset","display_name":"Reset (finance)","score":0.5000066757202148},{"id":"https://openalex.org/keywords/statement","display_name":"Statement (logic)","score":0.4758191704750061},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.45899704098701477},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.4392598867416382},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.31804049015045166},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1206003725528717}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7633587121963501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7200523614883423},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6787340641021729},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5951281785964966},{"id":"https://openalex.org/C2779795794","wikidata":"https://www.wikidata.org/wiki/Q7315343","display_name":"Reset (finance)","level":2,"score":0.5000066757202148},{"id":"https://openalex.org/C2777026412","wikidata":"https://www.wikidata.org/wiki/Q2684591","display_name":"Statement (logic)","level":2,"score":0.4758191704750061},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45899704098701477},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.4392598867416382},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.31804049015045166},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1206003725528717},{"id":"https://openalex.org/C106159729","wikidata":"https://www.wikidata.org/wiki/Q2294553","display_name":"Financial economics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/atnac.2018.8615367","is_oa":false,"landing_page_url":"https://doi.org/10.1109/atnac.2018.8615367","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 28th International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.usq.edu.au:35880","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400692","display_name":"University of Southern Queensland ePrints (University of Southern Queensland)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I185523456","host_organization_name":"University of Southern Queensland","host_organization_lineage":["https://openalex.org/I185523456"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item (Commonwealth Reporting Category E)"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7200000286102295,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W51022818","https://openalex.org/W419782851","https://openalex.org/W1540520532","https://openalex.org/W1550189296","https://openalex.org/W1742813727","https://openalex.org/W1984909705","https://openalex.org/W1985325392","https://openalex.org/W1986408604","https://openalex.org/W2051789158","https://openalex.org/W2081224628","https://openalex.org/W2096690579","https://openalex.org/W2122720535","https://openalex.org/W2207835792","https://openalex.org/W2741197453","https://openalex.org/W2782265428","https://openalex.org/W2787225588","https://openalex.org/W2789471414","https://openalex.org/W2790274259","https://openalex.org/W2790346253","https://openalex.org/W2794709063","https://openalex.org/W2799582685","https://openalex.org/W2805140296","https://openalex.org/W2806190320","https://openalex.org/W2807032814","https://openalex.org/W2963358330","https://openalex.org/W2963559715","https://openalex.org/W4239839867","https://openalex.org/W6602095933","https://openalex.org/W6632606870","https://openalex.org/W6748011366","https://openalex.org/W6750850928"],"related_works":["https://openalex.org/W350273603","https://openalex.org/W2393495588","https://openalex.org/W96259911","https://openalex.org/W2168225754","https://openalex.org/W4385608460","https://openalex.org/W2370772865","https://openalex.org/W1528611913","https://openalex.org/W2808944898","https://openalex.org/W2611670505","https://openalex.org/W4250612415"],"abstract_inverted_index":{"Many":[0],"web":[1],"services":[2],"have":[3],"a":[4,41,100,143],"subsystem":[5],"for":[6],"allowing":[7],"users":[8,85],"to":[9,30,33,47,60,75,89,118],"register,":[10],"authenticate,":[11],"reset":[12],"their":[13,87],"password,":[14],"and":[15,54,109,130,135],"change":[16],"personal":[17],"details.":[18],"It":[19],"is":[20,57,72,93,140],"important":[21],"that":[22,77,120,137],"such":[23,48,62],"subsystems":[24],"cannot":[25],"be":[26,80,90],"abused":[27],"by":[28,95],"attackers":[29],"gain":[31],"access":[32],"the":[34,55,97,103,107,112,116],"accounts":[35],"of":[36,102,106,115,127,132],"other":[37],"users.":[38],"We":[39],"study":[40],"system":[42,56,108,117],"which":[43],"was":[44],"initially":[45],"prone":[46],"attacks.":[49],"Specific":[50],"attacks":[51,63],"are":[52],"demonstrated":[53],"then":[58,73,110],"modified":[59],"prevent":[61],"in":[64,69,82],"future.":[65],"The":[66,125],"design":[67,146],"achieved":[68,94],"this":[70],"way":[71],"analysed":[74],"show":[76],"it":[78,121],"can't":[79],"broken":[81],"future":[83],"unless":[84],"allow":[86],"email":[88],"intercepted.":[91],"This":[92],"formulating":[96],"requirement":[98],"as":[99,142],"statement":[101],"user's":[104],"expectations":[105],"analysing":[111],"source":[113],"code":[114],"prove":[119],"meets":[122],"these":[123],"requirements.":[124],"process":[126],"attack,":[128],"correction,":[129],"formulation":[131],"security":[133,145],"rules,":[134],"proof":[136],"rules":[138],"hold,":[139],"proposed":[141],"methodical":[144],"philosophy.":[147]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
