{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:57:16Z","timestamp":1725803836033},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,3]]},"DOI":"10.1109\/sew.2007.93","type":"proceedings-article","created":{"date-parts":[[2007,12,18]],"date-time":"2007-12-18T15:01:14Z","timestamp":1197990074000},"page":"75-88","source":"Crossref","is-referenced-by-count":2,"title":["An Inconsistency Free Formalization of B\/S Architecture"],"prefix":"10.1109","author":[{"given":"Qin","family":"Li","sequence":"first","affiliation":[]},{"given":"Huibiao","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jifeng","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Microsoft","article-title":"ACID Properties(COM+)","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.07.037"},{"journal-title":"Enterprise JavaBeans Fourth Edition chapter ACID Transactions","year":"2004","author":"monson-haefel","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.05.005"},{"key":"ref14","article-title":"The Theory and Practice of Concurrency","author":"roscoe","year":"1997","journal-title":"Prentice Hall International Series in Computer Science"},{"key":"ref15","first-page":"324","author":"roscoe","year":"2006","journal-title":"Proc ICFEM 2006 8th International Conference on Formal Engineering Methods Macau China 29 October&#x2013;3 November 2006 volume 4260 of Lecture Notes in Computer Science"},{"journal-title":"Modelling and Analysis of Security Protocols","year":"2000","author":"ryan","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1014"},{"key":"ref18","first-page":"243","article-title":"Verifying security proto-cols: an application of CSP","author":"schneider","year":"2005","journal-title":"CSP 25 Symposium on the Occasion of 25 Years of CSP London UK July 7&#x2013;8 2004 volume 3525 of Lecture Notes in Computer Science"},{"journal-title":"Cryptography and Network Security Principles and Practices","year":"2006","author":"stallings","key":"ref19"},{"key":"ref4","first-page":"272","article-title":"From theory to practice in transactional composition of web services","author":"bruni","year":"2005","journal-title":"Proc EPEW\/WS-FM 2005 European Performance Engineering Workshop and International Workshop on Web Services and Formal Methods Versailles France September 1&#x2013;3 2005 volume 3670 of Lecture Notes in Computer Science"},{"year":"0","key":"ref3","article-title":"Browser Server Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-004-0058-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11549970_15"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.02.022"},{"key":"ref7","article-title":"Communicating Sequential Processes","author":"hoare","year":"1985","journal-title":"Prentice Hall International Series in Computer Science"},{"journal-title":"Web Ser-vices Concepts Architectures and Applications","year":"2003","author":"alonso","key":"ref2"},{"journal-title":"Understanding PKI Concepts Standards and Deployment Considerations","year":"2002","author":"adams","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(97)00020-2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2004.07.005"}],"event":{"name":"2007 31st IEEE Software Engineering Workshop","start":{"date-parts":[[2007,3,6]]},"location":"Columbia, MD","end":{"date-parts":[[2007,2,8]]}},"container-title":["31st IEEE Software Engineering Workshop (SEW 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4402751\/4402752\/04402767.pdf?arnumber=4402767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T11:16:58Z","timestamp":1489663018000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4402767\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/sew.2007.93","relation":{},"subject":[],"published":{"date-parts":[[2007,3]]}}}