{"id":"https://openalex.org/W2151052299","doi":"https://doi.org/10.1109/icdew.2007.4401010","title":"The rigorous implementation of a fair exchange protocol for non-repudiable Web service interactions - a case study","display_name":"The rigorous implementation of a fair exchange protocol for non-repudiable Web service interactions - a case study","publication_year":2007,"publication_date":"2007-04-01","ids":{"openalex":"https://openalex.org/W2151052299","doi":"https://doi.org/10.1109/icdew.2007.4401010","mag":"2151052299"},"language":"en","primary_location":{"id":"doi:10.1109/icdew.2007.4401010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdew.2007.4401010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE 23rd International Conference on Data Engineering Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062349109","display_name":"Nick Cook","orcid":"https://orcid.org/0000-0003-0301-1525"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"N. Cook","raw_affiliation_strings":["School of Computing Science, University of Newcastle, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Newcastle, UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068063417","display_name":"Louise Robinson","orcid":"https://orcid.org/0000-0003-0209-2503"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P. Robinson","raw_affiliation_strings":["Arjuna Technologies Limited, Newcastle-upon-Tyne, UK"],"affiliations":[{"raw_affiliation_string":"Arjuna Technologies Limited, Newcastle-upon-Tyne, UK","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101510432","display_name":"S. K. Shrivastava","orcid":"https://orcid.org/0000-0003-0916-7336"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"S. Shrivastava","raw_affiliation_strings":["School of Computing Science, University of Newcastle, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing Science, University of Newcastle, UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062349109"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.18528429,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2102","issue":null,"first_page":"307","last_page":"314"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8595751523971558},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.602628767490387},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.562192440032959},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5581663846969604},{"id":"https://openalex.org/keywords/formal-specification","display_name":"Formal specification","score":0.5389230251312256},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5144553184509277},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47622257471084595},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4714559018611908},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.46052226424217224},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.4600183367729187},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.455495685338974},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.44010475277900696},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39232000708580017},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3516882658004761},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1769438087940216},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1640629768371582},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.09459123015403748}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8595751523971558},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.602628767490387},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.562192440032959},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5581663846969604},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.5389230251312256},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5144553184509277},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47622257471084595},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4714559018611908},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.46052226424217224},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4600183367729187},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.455495685338974},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.44010475277900696},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39232000708580017},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3516882658004761},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1769438087940216},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1640629768371582},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.09459123015403748},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icdew.2007.4401010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdew.2007.4401010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE 23rd International Conference on Data Engineering Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.66.8067","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.8067","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ncl.ac.uk/research/pubs/inproceedings/papers/969.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W190183106","https://openalex.org/W1528878926","https://openalex.org/W1530676499","https://openalex.org/W1538122200","https://openalex.org/W1550863457","https://openalex.org/W1608435723","https://openalex.org/W1989968537","https://openalex.org/W1992022440","https://openalex.org/W2001914359","https://openalex.org/W2065214105","https://openalex.org/W2092612049","https://openalex.org/W2098284912","https://openalex.org/W2098496390","https://openalex.org/W2117064875","https://openalex.org/W2141117846","https://openalex.org/W2156562238","https://openalex.org/W2164037513","https://openalex.org/W2170082079","https://openalex.org/W2170718011","https://openalex.org/W2187360174","https://openalex.org/W2276605304","https://openalex.org/W3150306543","https://openalex.org/W3153146546","https://openalex.org/W6631782875","https://openalex.org/W6632414769","https://openalex.org/W6675050157","https://openalex.org/W6684091298","https://openalex.org/W6694210458"],"related_works":["https://openalex.org/W2006962382","https://openalex.org/W2171674700","https://openalex.org/W2145025660","https://openalex.org/W1922520186","https://openalex.org/W1544097700","https://openalex.org/W2037121848","https://openalex.org/W1946493810","https://openalex.org/W1495250406","https://openalex.org/W17088386","https://openalex.org/W1608485412"],"abstract_inverted_index":{"The":[0,50,139,176],"correct":[1],"implementation":[2,45,91,168],"of":[3,15,55,68,74,92,105,165,182],"security":[4,56,106],"protocols":[5,57,99],"is":[6,137],"a":[7,12,29,86,93,151,154,166,170],"challenging":[8],"task.":[9],"To":[10],"achieve":[11],"high":[13],"degree":[14],"confidence":[16],"in":[17,71,169],"an":[18,44,143,180],"implementation,":[19],"as":[20,131],"with":[21,62,150,157,179],"any":[22],"software,":[23],"ideally":[24],"one":[25],"requires":[26],"both:":[27],"(i)":[28],"formal":[30,51,152],"specification":[31,52],"that":[32],"has":[33,58,76],"been":[34],"subjected":[35],"to":[36,42,112,123,127,146,162],"verification,":[37],"and":[38,53],"(it)":[39],"tool":[40,159],"support":[41,136,160],"generate":[43],"from":[46],"the":[47,66,69,72,90,102,163,183],"verified":[48],"specification.":[49],"verification":[54],"attracted":[59],"considerable":[60,158],"attention,":[61],"corresponding":[63],"advances.":[64],"However,":[65],"state":[67],"art":[70],"generation":[73],"implementations":[75],"not":[77],"progressed":[78],"beyond":[79],"relatively":[80],"simple":[81],"protocols.":[82,107],"This":[83],"paper":[84,177],"presents":[85],"case":[87,140],"study":[88,141],"on":[89],"deterministically":[94],"fair":[95],"non-repudiation":[96],"protocol.":[97],"Such":[98],"are":[100,109],"among":[101],"most":[103],"complex":[104],"Sub-protocols":[108],"typically":[110],"required":[111],"guarantee":[113,124],"timely":[114],"termination.":[115],"A":[116],"trusted":[117],"third":[118],"party":[119],"must":[120],"be":[121],"involved":[122],"fairness.":[125],"Finally,":[126],"satisfy":[128],"requirements":[129],"such":[130],"non-repudiable":[132],"audit,":[133],"significant":[134],"infrastructure":[135],"needed.":[138],"demonstrates":[142],"improved":[144],"approach":[145],"protocol":[147,167],"implementation.":[148],"Starting":[149],"specification,":[153],"rigorous":[155],"process":[156],"leads":[161],"deployment":[164],"flexible":[171],"Web":[172],"services-based":[173],"execution":[174],"framework.":[175],"concludes":[178],"evaluation":[181],"approach.":[184]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
