{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:11:51Z","timestamp":1748751111953,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260587"},{"type":"electronic","value":"9783319260594"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26059-4_19","type":"book-chapter","created":{"date-parts":[[2015,11,27]],"date-time":"2015-11-27T16:59:56Z","timestamp":1448643596000},"page":"340-353","source":"Crossref","is-referenced-by-count":1,"title":["A Formal Dynamic Verification of Choreographed Web Services Conversations"],"prefix":"10.1007","author":[{"given":"Karim","family":"Dahmani","sequence":"first","affiliation":[]},{"given":"Mahjoub","family":"Langar","sequence":"additional","affiliation":[]},{"given":"Riadh","family":"Robbana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,28]]},"reference":[{"key":"19_CR1","unstructured":"Corporation, I.: Business process execution language for web services bpel-4ws (2002). http:\/\/www.ibm.com\/developerworks\/library\/ws-bpel\/"},{"key":"19_CR2","unstructured":"Kavantzas, N., Burdett, D., Ritzinger, G., Fletcher, T., Lafon, Y.: Web services choreography description language version 1.0. W3C Working Draft, December 2004"},{"issue":"3","key":"19_CR3","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1145\/319301.319345","volume":"21","author":"G Morrisett","year":"1999","unstructured":"Morrisett, G., Walker, D., Crary, K., Glew, N.: From system f to typed assembly language. ACM Trans. Program. Lang. Syst. 21(3), 527\u2013568 (1999)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL \u201997, pp. 106\u2013119. ACM, New York, NY, USA (1997)","DOI":"10.1145\/263699.263712"},{"issue":"1\u20132","key":"19_CR5","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1\u20132), 2\u201316 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Martinell, F., Matteucci, I.: Through modeling to synthesis of security automata. In: Proceedings of the Second International Workshop on Security and Trust Management (STM 2006). Electronic Notes in Theoretical Computer Science, vol. 179, pp. 31\u201346 (2007)","DOI":"10.1016\/j.entcs.2006.08.029"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Erlingsson, Schneider, F.: Irm enforcement of java stack inspection. In: 2000 Proceedings of IEEE Symposium on Security and Privacy, 2000. S P 2000, pp. 246\u2013255 (2000)","DOI":"10.1109\/SECPRI.2000.848461"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.entcs.2008.04.007","volume":"209","author":"M Carbone","year":"2008","unstructured":"Carbone, M., Honda, K., Yoshida, N.: Theoretical aspects of communication-centred programming. Electr. Notes Theor. Comput. Sci. 209, 125\u2013133 (2008)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"issue":"1","key":"19_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R Milner","year":"1992","unstructured":"Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes. I. Inf. Comput. 100(1), 1\u201340 (1992)","journal-title":"I. Inf. Comput."},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type discipline for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122\u2013138. Springer, Heidelberg (1998)"},{"issue":"3","key":"19_CR11","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/S1571-0661(04)00141-0","volume":"16","author":"M Hennessy","year":"1998","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Electr. Notes Theor. Comput. Sci. 16(3), 174\u2013188 (1998)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-540-30538-5_14","volume-title":"FSTTCS 2004: Foundations of Software Technology and Theoretical Computer Science","author":"M Carbone","year":"2004","unstructured":"Carbone, M., Nielsen, M., Sassone, V.: A calculus for trust management. In: Lodaya, K., Mahajan, M. (eds.) FSTTCS 2004. LNCS, vol. 3328, pp. 161\u2013173. Springer, Heidelberg (2004)"},{"issue":"3","key":"19_CR13","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1145\/256167.256195","volume":"19","author":"D Kozen","year":"1997","unstructured":"Kozen, D.: Kleene algebra with tests. ACM Trans. Program. Lang. Syst. 19(3), 427\u2013443 (1997)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"4","key":"19_CR14","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1016\/j.jnca.2013.01.009","volume":"36","author":"C Dumez","year":"2013","unstructured":"Dumez, C., Bakhouya, M., Gaber, J., Wack, M., Lorenz, P.: Model-driven approach supporting formal verification for web service composition protocols. J. Netw. Comput. Appl. 36(4), 1102\u20131115 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"19_CR15","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TASE.2008.916747","volume":"6","author":"W Tan","year":"2009","unstructured":"Tan, W., Fan, Y., Zhou, M.: A petri net-based method for compatibility analysis and composition of web services in business process execution language. IEEE Trans. Autom. Sci. Eng. 6(1), 94\u2013106 (2009)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Dranidis, D., Ramollari, E., Kourtesis, D.: Run-time verification of behavioural conformance for conversational web services. In: ECOWS, pp. 139\u2013147 (2009)","DOI":"10.1109\/ECOWS.2009.19"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-1-4020-6268-1_51","volume-title":"Innovations and Advanced Techniques in Computer and Information Sciences and Engineering","author":"L Ardissono","year":"2007","unstructured":"Ardissono, L., Furnari, R., Goy, A., Petrone, G., Segnan, M.: Monitoring choreographed services. In: Sobh, T. (ed.) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, pp. 283\u2013288. Springer, Netherlands (2007)"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-29420-4_10","volume-title":"Formal Aspects of Security and Trust","author":"R Gay","year":"2012","unstructured":"Gay, R., Mantel, H., Sprick, B.: Service automata. In: Barthe, G., Datta, A., Etalle, S. (eds.) FAST 2011. LNCS, vol. 7140, pp. 148\u2013163. Springer, Heidelberg (2012)"},{"issue":"3","key":"19_CR19","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TSC.2012.3","volume":"6","author":"W She","year":"2013","unstructured":"She, W., Yen, I., Thuraisingham, B.M., Bertino, E.: Security-aware service composition with fine-grained information flow control. IEEE Trans. Serv. Comput. 6(3), 330\u2013343 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-07452-8_6","volume-title":"Engineering Secure Future Internet Services and Systems","author":"JA Mart\u00edn","year":"2014","unstructured":"Mart\u00edn, J.A., Martinelli, F., Matteucci, I., Pimentel, E., Turuani, M.: On the synthesis of secure services composition. In: Heisel, M., Joosen, W., Lopez, J., Martinelli, F. (eds.) Engineering Secure Future Internet Services and Systems. LNCS, vol. 8431, pp. 140\u2013159. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26059-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T15:43:59Z","timestamp":1748706239000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26059-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260587","9783319260594"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26059-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}