{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:15:20Z","timestamp":1743117320865,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540651017"},{"type":"electronic","value":"9783540496533"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49653-x_87","type":"book-chapter","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T17:10:12Z","timestamp":1290186612000},"page":"873-889","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["The Coyote Project: Framework for Multi-party E-Commerce"],"prefix":"10.1007","author":[{"given":"Asit","family":"Dan","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Dias","sequence":"additional","affiliation":[]},{"given":"Thao","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Marty","family":"Sachs","sequence":"additional","affiliation":[]},{"given":"Hidayatullah","family":"Shaikh","sequence":"additional","affiliation":[]},{"given":"Richard","family":"King","sequence":"additional","affiliation":[]},{"given":"Sastry","family":"Duri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,15]]},"reference":[{"key":"87_CR1","doi-asserted-by":"crossref","unstructured":"A. Dan, and F. N. Parr, \u201cThe Coyote Approach for Network Centric Business Service Applications: Conversational Service Transactions, a Monitor, and an Application Style,\u201d HPTS Workshop, Asilomar, CA, Sept. 1997.","DOI":"10.1007\/978-1-4471-1286-0_15"},{"key":"87_CR2","doi-asserted-by":"crossref","unstructured":"A. Dan, and F. N. Parr, \u201cAn Object implementation of Network Centric Business Service Applications: (NCBSAs): Conversational Service Transactions, a Service Monitor and an Application Style,\u201d OOPSLA Business Object Workshop, Atlanta, GA, Sept. 1997.","DOI":"10.1007\/978-1-4471-1286-0_15"},{"key":"87_CR3","unstructured":"Electronic Commerce Resource Guide, \n                    http:\/\/www.premenos.com"},{"key":"87_CR4","unstructured":"Customer Information Control System\/ Enterprise Systems Architecture(CICS\/ESA ), IBM, 1991."},{"key":"87_CR5","unstructured":"J. Gray, and A. Reuter \u201cTransaction Processing: Concepts and Techniques,\u201d Morgan Kaufmann Publishers, 1993."},{"key":"87_CR6","doi-asserted-by":"crossref","unstructured":"H. Garcia-Molina, and K. Salem, \u201cSAGAS,\u201d Proc. of ACM SIGMOD Conf., 1987, pp. 249\u2013259.","DOI":"10.1145\/38714.38742"},{"key":"87_CR7","unstructured":"P. Attie, M. P. Singh, A. Sheth, M. Rusinkiewicz, \u201cSpecifying and Enforcing Intertask Dependencies\u201d, VLDB 1993, pp. 134\u2013145."},{"key":"87_CR8","unstructured":"G. Alonso, D. Agrawal, A. El Abbadi, M. Kamath, R. Gunthor and C. Mohan, \u201cAdvanced Transaction Models in Workflow Contexts\u201d In 12th ICDE, New Orleans, Lousiana, Feb. 1996."},{"key":"87_CR9","doi-asserted-by":"crossref","unstructured":"Y. Breitbart, A. Deacon, H. Schek, A. Sheth and G. Weikum, \u201cMerging Application Centric and Data Centric Approaches to Support Transaction-Oriented Multi-System Workflows\u201d, ACM SIGMOD Record, 22(3), Sept. 1993.","DOI":"10.1145\/163090.163095"},{"key":"87_CR10","doi-asserted-by":"crossref","unstructured":"A. Biliris, S. Dar, N. Gehani, H. V. Jagadish, K. Ramamritham, \u201cASSET: A System for Supporting Extended Transactions\u201d, Proc. ACM SIGMOD 1994, pp. 44\u201354.","DOI":"10.1145\/191843.191848"},{"key":"87_CR11","unstructured":"Object Management Group (OMG), \n                    http:\/\/www.omg.org"},{"key":"87_CR12","unstructured":"FlowMark, SBOF-8427-00, IBM Corp., 1996."},{"key":"87_CR13","unstructured":"XML 1.0 Proposed Recommendation, \n                    http:\/\/www.w3c.org\n                    \n                  ."},{"key":"87_CR14","unstructured":"Enterprise JavaBeans Specification, \n                    http:\/\/www.javasoft.com\/products\/ejb"},{"key":"87_CR15","unstructured":"MQSeries: An Introduction to Messaging and Queuing, IBM publication no. G511-1908"},{"key":"87_CR16","unstructured":"HTTP\/1.1 Specification, \n                    http:\/\/www.w3c.org"},{"key":"87_CR17","unstructured":"The Open Buying on the Internet (OBI) Consortium, \n                    http:\/\/www.openbuy.org\/"},{"key":"87_CR18","unstructured":"RSA Data Security, Frequently Asked Questions About Today\u2019s Cryptography 3.0, \n                    http:\/\/www.rsa.com\/rsalabs\/newfaq"}],"container-title":["Lecture Notes in Computer Science","Research and Advanced Technology for Digital Libraries"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49653-X_87","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:09:12Z","timestamp":1558264152000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49653-X_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540651017","9783540496533"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-49653-x_87","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"15 March 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}