From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT
Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appeara...
Saved in:
Published in | Journal of sensors Vol. 2016; no. 2016; pp. 1 - 11 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Cairo, Egypt
Hindawi Publishing Corporation
01.01.2016
Hindawi Limited |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN) and wireless body area networks (WBAN), formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN. |
---|---|
AbstractList | Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN) and wireless body area networks (WBAN), formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN. |
Author | Chen, Tieming Yu, Zhenbo Li, Shijian Chen, Bo |
Author_xml | – sequence: 1 fullname: Chen, Bo – sequence: 2 fullname: Li, Shijian – sequence: 3 fullname: Yu, Zhenbo – sequence: 4 fullname: Chen, Tieming |
BookMark | eNqF0U1LAzEQBuAgFWyrN88S8CJobbLZJLvearEq1A9o_bgt6WZWU7dJTbaU_nu3tFTwIgzMwDwMA28LNayzgNAxJZeUct6NCBXdRKaSi2QPNalIZEdGImnsZv5-gFohTAkRTDLWRNXAuxl-Mx5KCAGPwAbn8SNUS-e_Aq7c7-7a6RXueVC79RUeOD9TJX5wGkpjP7CyGr-CN4XJVWWcxXWNIF94U63wS1iT5974EO0XqgxwtO1tNB7cjPt3neHT7X2_N-wozljVEXEuJcmjgqacMlYUSjAGBedRQhTkQicyj7WIeM2lnsiJBkpUFOt4kqaJYm10tjk79-57AaHKZibkUJbKgluEjMqURalgManp6R86dQtv6-dqxQkTgiZrdbFRuXcheCiyuTcz5VcZJdk6gWydQLZNoObnG_5prFZL858-2WioDRTqV1NKhBDsB-9WkR4 |
CitedBy_id | crossref_primary_10_1007_s10586_017_0847_y |
Cites_doi | 10.1016/j.comnet.2008.05.009 10.1109/TIT.1983.1056650 10.1109/JSAC.2005.861382 10.3969/j.issn.1004-1699.2012.04.026 10.2478/v10127-010-0032-7 10.1007/978-3-540-88479-8-22 |
ContentType | Journal Article |
Copyright | Copyright © 2016 Tieming Chen et al. Copyright © 2016 Tieming Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
Copyright_xml | – notice: Copyright © 2016 Tieming Chen et al. – notice: Copyright © 2016 Tieming Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
DBID | ADJCN AHFXO RHU RHW RHX AAYXX CITATION 3V. 7SP 7U5 7XB 8AL 8FD 8FE 8FG 8FK ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU CWDGH D1I DWQXO GNUQQ HCIFZ JQ2 K7- KB. L6V L7M M0N M7S P5Z P62 PDBOC PIMPY PQEST PQQKQ PQUKI PRINS PTHSS Q9U |
DOI | 10.1155/2016/8797568 |
DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete Hindawi Publishing Complete Hindawi Publishing Subscription Journals Open Access Journals (Hindawi Publishing) CrossRef ProQuest Central (Corporate) Electronics & Communications Abstracts Solid State and Superconductivity Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College Middle East & Africa Database ProQuest Materials Science Collection ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Materials Science Database ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computing Database Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Materials Science Collection Publicly Available Content Database ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection ProQuest Central Basic |
DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Materials Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest Engineering Collection Middle East & Africa Database ProQuest Central Korea Materials Science Database Advanced Technologies Database with Aerospace Engineering Collection ProQuest Materials Science Collection Advanced Technologies & Aerospace Collection ProQuest Computing Engineering Database ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection Solid State and Superconductivity Abstracts ProQuest One Academic ProQuest Central (Alumni) |
DatabaseTitleList | Solid State and Superconductivity Abstracts Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: RHX name: Open Access Journals (Hindawi Publishing) url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1687-7268 |
Editor | Cao, Jian-Nong |
Editor_xml | – sequence: 1 givenname: Jian-Nong surname: Cao fullname: Cao, Jian-Nong |
EndPage | 11 |
ExternalDocumentID | 3900591281 10_1155_2016_8797568 1110666 |
GroupedDBID | .4S .DC 188 24P 29L 2UF 2WC 3V. 4.4 5GY 5VS 8FE 8FG 8R4 8R5 AAFWJ AAJEY AAKPC ABJCF ABUWG ACGFO ACIWK ADBBV ADJCN AEGXH AENEX AFKRA AHFXO AINHJ ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ BPHCQ C1A CAHYU CCPQU CNMHZ CS3 CWDGH D1I DWQXO E3Z EBS EDO EJD GNUQQ GROUPED_DOAJ H13 HCIFZ IAO IEA IGS IL9 IPNFZ ITC K6V K7- KB. KQ8 L6V M0N M7S M~E OK1 P62 PDBOC PIMPY PQQKQ PROAC PTHSS Q2X RHU RHX RIG RNS TR2 TUS UGNYK UNMZH RHW AAYXX CITATION 7SP 7U5 7XB 8AL 8FD 8FK JQ2 L7M PQEST PQUKI PRINS Q9U |
ID | FETCH-LOGICAL-a533t-64c770c2f195133ffa633ef55280aec6d87c4d625a537db7bde10a24d4b998a3 |
IEDL.DBID | RHX |
ISSN | 1687-725X |
IngestDate | Fri Aug 16 05:05:46 EDT 2024 Thu Oct 10 22:21:28 EDT 2024 Fri Aug 23 02:36:49 EDT 2024 Sun Jun 02 18:53:12 EDT 2024 Wed Nov 06 06:03:38 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2016 |
Language | English |
License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a533t-64c770c2f195133ffa633ef55280aec6d87c4d625a537db7bde10a24d4b998a3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
OpenAccessLink | https://dx.doi.org/10.1155/2016/8797568 |
PQID | 1750366180 |
PQPubID | 237780 |
PageCount | 11 |
ParticipantIDs | proquest_miscellaneous_1793296340 proquest_journals_1750366180 crossref_primary_10_1155_2016_8797568 hindawi_primary_10_1155_2016_8797568 emarefa_primary_1110666 |
PublicationCentury | 2000 |
PublicationDate | 2016-01-01 |
PublicationDateYYYYMMDD | 2016-01-01 |
PublicationDate_xml | – month: 01 year: 2016 text: 2016-01-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Cairo, Egypt |
PublicationPlace_xml | – name: Cairo, Egypt – name: New York |
PublicationTitle | Journal of sensors |
PublicationYear | 2016 |
Publisher | Hindawi Publishing Corporation Hindawi Limited |
Publisher_xml | – name: Hindawi Publishing Corporation – name: Hindawi Limited |
References | Chitra J. Girish R. Lavy L. SeAK: secure authentication and key generation protocol based on dual antennas for wireless body area networks Radio Frequency Identification: Security and Privacy Issues 2014 Springer 74 89 Lecture Notes in Computer Science (3) 2010; 47 (10) 2008; 17 (5) 2008; 52 Perring A. Canetti R. Tygar J. The TESLA broadcast authentication protocol RSA CryptoBytes 2002 UC Berkeley and IBM Research 2 13 Cherukuri S. Venkatasubramanian K. Gupta S. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body Proceedings of the International Conference on Parallel Processing Workshops (ICPPW '03) 2003 IEEE 432 439 10.1109/icppw.2003.1240399 Luk M. Mezzour G. Perrig A. Gligor V. MiniSec: a secure sensor network communication architecture Proceedings of the 6th International Symposium on Information Processing in Sensor Networks April 2007 Cambridge, UK IEEE 479 488 10.1145/1236360.1236421 2-s2.0-35348897342 (12) 2006; 24 Ballarini P. Miller A. Model checking medium access control for sensor networks Proceedings of the 2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA '06) November 2006 Paphos, Cyprus IEEE 255 262 10.1109/isola.2006.16 (13) 1981; 29 Karlof C. Sastry N. Wagner D. TinySec: a link layer security architecture for wireless sensor networks Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04) November 2004 ACM 162 175 2-s2.0-26444574670 Liu Y. Sun J. Dong J. S. Developing model checkers using PAT Proceedings of the 8th International Symposium on Automated Technology for Verification and Analysis (ATVA '10) 2010 Singapore 371 377 Lowe G. Breaking and fixing the Needham-Schroeder public-key authentication protocol sing CSP and FDR Proceedings of the 2nd International Workshop on Tools and Algorithms for Construction and Analysis of Systems (TACAS '96) 1996 1055 Springer Lecture Notes in Computer Science (1) 2012; 25 1 12 13 3 (14) 2014 (2) 1996; 1055 5 (8) 2002 10 |
References_xml | – volume: 24 start-page: 247 issue: 2 year: 2006 end-page: 260 ident: 12 article-title: Location-based compromise-tolerant security mechanisms for wireless sensor networks publication-title: – volume: 29 start-page: 350 issue: 2 year: 1981 end-page: 357 ident: 13 article-title: On the security of public key protocols publication-title: – volume: 52 start-page: 2532 issue: 13 year: 2008 end-page: 2542 ident: 5 article-title: Dynamic duty cycle and adaptive contention window based QoS-MAC protocol for wireless multimedia sensor networks publication-title: – volume: 47 start-page: 81 issue: 1 year: 2010 end-page: 97 ident: 3 article-title: Formal analysis of security protocols for wireless sensor networks publication-title: – volume: 17 start-page: 307 issue: 7 year: 2008 end-page: 322 ident: 10 article-title: Model checking CSP revisited: introducing a process analysis toolkit publication-title: – volume: 25 start-page: 545 issue: 4 year: 2012 end-page: 551 ident: 1 article-title: Improved location-based compromise-tolerant security mechanisms for wireless sensor networks publication-title: – volume: 1055 volume-title: Breaking and fixing the Needham-Schroeder public-key authentication protocol sing CSP and FDR year: 1996 ident: 2 – ident: 5 doi: 10.1016/j.comnet.2008.05.009 – ident: 13 doi: 10.1109/TIT.1983.1056650 – start-page: 74 volume-title: SeAK: secure authentication and key generation protocol based on dual antennas for wireless body area networks year: 2014 ident: 14 – ident: 12 doi: 10.1109/JSAC.2005.861382 – ident: 1 doi: 10.3969/j.issn.1004-1699.2012.04.026 – ident: 3 doi: 10.2478/v10127-010-0032-7 – start-page: 2 volume-title: The TESLA broadcast authentication protocol year: 2002 ident: 8 – ident: 10 doi: 10.1007/978-3-540-88479-8-22 |
SSID | ssj0063733 |
Score | 2.0794532 |
Snippet | Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of... |
SourceID | proquest crossref hindawi emarefa |
SourceType | Aggregation Database Publisher |
StartPage | 1 |
SubjectTerms | Authentication Automation Formal method Mathematical models Networks Remote sensors Security Wireless networks |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3dS8MwED90Y6AP4rfTKRH0saxfSTZfZJONITiGTtlbSZsUha2dW4f433vp0m0gKPShNOEKl-TufpdLfgA3kSPQr0bUkraILF_G1Aqpx6wmumK0mDiLYp3Qf-qz3qv_OKIjk3Cbm7LKwibmhlqmkc6R1x294YbOpGHfTz8tzRqld1cNhcY2lF1ECnYJyu1Of_Bc2GLm8ZxM3mG4lLhLR0XpO6WI-h1Wb_Amp_qa1Q2nVFETgS_oqSrvGhd_ffyy07nz6e7DnokaSWs5zAewpZJD2N24S_AIsu4snRBdzDpG40VeEJ6mM9JfVnnPSZau29qp_EZZSqya70hXx65joqnR9AF1IhJJ3lB0bHJ6BJ8Xw3VH8joDMmgNj2HY7QwfepahVLAExnWZxfyIcztyY6epiV3iWDDPUzGlbsMWKmKywSNfIibC7lyGPJTKsYXrSz9EXCa8EyglaaLOgDSZo1z8iLKYH9oqRKQoPCZc4SKKi8Mq3BYqDabLizOCHHBQGmjVB0b1VTg1-l53w5AEUVUVboz-_xFQKwYnMOtvHqxnSxWuV824cvR2iEhUutB9MHZF--Pb53-LuIAd_cNl4qUGpWy2UJcYimThlZlvP40_2is priority: 102 providerName: ProQuest |
Title | From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT |
URI | https://search.emarefa.net/detail/BIM-1110666 https://dx.doi.org/10.1155/2016/8797568 https://www.proquest.com/docview/1750366180 https://search.proquest.com/docview/1793296340 |
Volume | 2016 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3rS8MwED90IugH8e10jgj6sdhXktZvm6wOwSHblPmppE2Kwmxlq4j_vZcum68PCoU-kl7hknv8LtccwGnqCLSrKbWkLVLLlxm1EuoxK0RTjBoTZ1GmA_o3Pda9869HdGQ2SZr-XsJHa4fw3GHnAQ85ZcEyLAeBlr9-dzRXuMzjVcV4h6G8cJeO5vntP979ZnlW1bPACzRHq48a_L49_VLGlYWJNmHDuIakNRvLLVhS-Tasf9kwcAfKaFI8E52xOkYNRQaIQYsJ6c1SuaekLD7b2oV8R1pKLJovSKQd1DHR9c_0X-hE5JLcI-nMBO4IHgNT0I5UyQTktjXchWHUGV52LVM3wRLovJUW81PO7dTNnFBXb8kywTxPZZS6gS1UymTAU18i8MHuXCY8kcqxhetLP0HwJbw9qOVFrg6AhMxRLj5EWsxPbJUgHBQeE65wEaplSR3O5iyNX2a7Y8QVqqA01qyPDevrsG_4_dkN_Q6ETnU4Nfz_g0BjPjixEbJp7Og1WPQvArsOJ4tmFA-95iFyVbzqPuigopLx7cP_fekI1vTtLMrSgFo5eVXH6HeUSRPnXnTVhJVW67rzgOd2p3fbb1Zz8QP2GNLT |
link.rule.ids | 315,783,787,866,881,12777,21400,27936,27937,33385,33386,33756,33757,43612,43817,74363,74630 |
linkProvider | Hindawi Publishing |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3dT9swED8NJgQ8IAYDOspmJHiMyIc_2r0gQIRuKxVSy9S3yIkdbRIk0AYh_nvuUodWmjSkPESxdZHO9u_udz77AI6yQKNdzYRnfJ153OTCS0UkvS6aYkRMnEU5BfSvB7J3y3-OxdgF3KYurbLBxBqoTZlRjPwkoA03NCYd__Th0aOqUbS76kpoLMFHHqGtppPi8VWDxDJSdSn5QOJCUqEYN4nvQiDnD-RJR3WVoEtWF0zSir3X-IJ2auUPseLnv_-gdG164k3YcD4jO5sN8if4YIstWF-4SXAbqnhS3jNKZb1D6GJDJKflhA1mOd5TVpXztvPSvKAsq9-av7OYPNc7RoXR6Hg604Vhv1F07iJ6DJ-hq3TH6iwDdnM2-gyj-HJ00fNcQQVPo1dXeZJnSvlZmAddKuuS51pGkc2FCDu-tpk0HZVxg4wIuyuTqtTYwNchNzxFVqajHVguysLuAevKwIb4EWVJnvo2RZ6oI6lDHSKHy9MWHDcqTR5m12YkNd0QIiHVJ071Ldh1-p53Q4cEOVULjpz-3xHQbgYncatvmsznSgsO35px3dBmiC5s-UR90HNF9OH-l_-L-AarvdF1P-n_GPzahzX6-SwE04blavJkD9ApqdKv9cx7BTwu27Y |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3dS9xAEB_aE0t9KK3aetXWFfQxXD72464voq1Bqx6HXsu9hU12lwqa6F2k9L93JrfxBMFCHkJ2mcBkdmZ-s7_sAOwWkca4WojAhLoIuHEiyEUigwGGYvSYaEWOCvrnQ3n8i_-ciInnP808rbL1iY2jNlVBNfJeRBtuGEz6Yc95WsToR7p_exdQBynaafXtNF7DkuIyCTuwdHg0HF20flkmqmksH0lcVioWk5YGL0QvJspXXw2UoCNXnwSoZXuj8Qaj1vIfwsh_r5757CYQpe_hnc8g2cH8k3-AV7ZchZUn5wquQZ1OqxtGxNZrdGTsEqFqNWXDOeN7xupqMXZYmX8oy-rH4W8spTz2mlGbNPpZnenSsN8o2vn6HsPr0ve9Yw3ngI0OxuswTo_G348D314h0Jjj1YHkhVJhEbtoQE1enNMySawTIu6H2hbS9FXBDeIjnK5MrnJjo1DH3PAcMZpOPkKnrEq7AWwgIxvjQ5QleR7aHFGjTqSOdYyIzuVd2GtVmt3OD9HIGvAhREaqz7zqu_DJ63sxDdMTRFhd2PX6_4-ArfbjZH4tzrKF5XRh53EYVxFtjejSVvc0B_NY9EU8_PyyiG14g2aXnZ0MTzfhLb17Xo_Zgk49vbdfMEOp86_e9B4AcvThUw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=From+Wireless+Sensor+Networks+to+Wireless+Body+Area+Networks%3A+Formal+Modeling+and+Verification+on+Security+Using+PAT&rft.jtitle=Journal+of+sensors&rft.au=Chen%2C+Bo&rft.au=Li%2C+Shijian&rft.au=Yu%2C+Zhenbo&rft.au=Chen%2C+Tieming&rft.date=2016-01-01&rft.pub=Hindawi+Publishing+Corporation&rft.issn=1687-725X&rft.eissn=1687-7268&rft.volume=2016&rft.issue=2016&rft.spage=1&rft.epage=11&rft_id=info:doi/10.1155%2F2016%2F8797568&rft.externalDBID=ADJCN&rft.externalDocID=1110666 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1687-725X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1687-725X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1687-725X&client=summon |