Fröschle, Sibylle B.Sibylle B.FröschleSommer, NilsNilsSommer2021-12-132021-12-132012-07-23Lecture Notes in Computer Science (7140 LNCS): 131-147 (2012-07-23)http://hdl.handle.net/11420/11272We have recently put forward several ideas of how to specify, model, and verify security APIs centered around the slogan 'security APIs are also like programs' and first-order linear time logic extended by past operators. We have developed these ideas based on an investigation of PKCS #11, a standard widely adopted in industry, and presented preliminary results at FAST'10. In this paper, we present several novel results about PKCS #11 that we have obtained based on the full implementation of this approach. In particular, this concerns an analysis of the 'wrap with trusted feature', a full analysis of which has been out of reach for the previous models. At the same time we provide concepts and terminology that connect to Bond and Clulow's 'Types of Intention' and devise an informal method of configuring and understanding PKCS #11. © 2012 Springer-Verlag.enInformatikPhysikTechnikConcepts and proofs for configuring PKCS#11Conference Paper10.1007/978-3-642-29420-4_9Other