{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:01Z","timestamp":1767340201557,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272684"},{"type":"electronic","value":"9783642272691"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27269-1_7","type":"book-chapter","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T05:52:10Z","timestamp":1326779530000},"page":"106-124","source":"Crossref","is-referenced-by-count":6,"title":["Model Checking Adaptive Multilevel Service Compositions"],"prefix":"10.1007","author":[{"given":"Sabina","family":"Rossi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2009.10.022","volume":"255","author":"F. Abouzaid","year":"2009","unstructured":"Abouzaid, F., Mullins, J.: Model-checking Web Services Orchestrations using BP-calculus. Electronic Notes in Theoretical Computer Science\u00a0255, 3\u201321 (2009)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"7_CR2","unstructured":"Basciutti, T.: Model-Checking Web Services. Master\u2019s thesis, Department of Computer Science, University Ca\u2019 Foscari of Venice (2010)"},{"key":"7_CR3","first-page":"327","volume-title":"Proc. of International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Workshop on Global Computing Models and Technologies (GlobalComp 2008)","author":"G. Bernardi","year":"2008","unstructured":"Bernardi, G., Bugliesi, M., Macedonio, D., Rossi, S.: A Theory of Adaptable Contract-Based Service Composition. In: Proc. of International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Workshop on Global Computing Models and Technologies (GlobalComp 2008), pp. 327\u2013334. IEEE Computer Society, Los Alamitos (2008)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-01364-5_3","volume-title":"Web Services and Formal Methods","author":"M. Bravetti","year":"2009","unstructured":"Bravetti, M., Zavattaro, G.: Contract Compliance and Choreography Conformance in the Presence of Message Queues. In: Bruni, R., Wolf, K. (eds.) WS-FM 2008. LNCS, vol.\u00a05387, pp. 37\u201354. Springer, Heidelberg (2009)"},{"issue":"4","key":"7_CR5","first-page":"451","volume":"89","author":"M. Bravetti","year":"2009","unstructured":"Bravetti, M., Zavattaro, G.: A Foundational Theory of Contracts for Multi-party Service Composition. Fundamenta Informaticae\u00a089(4), 451\u2013478 (2009)","journal-title":"Fundamenta Informaticae"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/11841197_10","volume-title":"Web Services and Formal Methods","author":"S. Carpineti","year":"2006","unstructured":"Carpineti, S., Castagna, G., Laneve, C., Padovani, L.: A Formal Account of Contracts for Web Services. In: Bravetti, M., N\u00fa\u00f1ez, M., Tennenholtz, M. (eds.) WS-FM 2006. LNCS, vol.\u00a04184, pp. 148\u2013162. Springer, Heidelberg (2006)"},{"key":"7_CR7","first-page":"261","volume-title":"Proc. of the annual Symposium on Principles of Programming Languages (POPL 2008)","author":"G. Castagna","year":"2008","unstructured":"Castagna, G., Gesbert, N., Padovani, L.: A Theory of Contracts for Web Services. In: Proc. of the annual Symposium on Principles of Programming Languages (POPL 2008), pp. 261\u2013272. ACM press, New York (2008)"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1538917.1538920","volume":"31","author":"G. Castagna","year":"2009","unstructured":"Castagna, G., Gesbert, N., Padovani, L.: A Theory of Contracts for Web Services. ACM Transactions on Programming Languages and Systems (TOPLAS)\u00a031, 53\u201361 (2009)","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"key":"7_CR9","volume-title":"Model checking","author":"E.M. Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model checking. The MIT Press, Cambridge (1999)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/3-540-61474-5_87","volume-title":"Computer Aided Verification","author":"R. Cleaveland","year":"1996","unstructured":"Cleaveland, R., Sims, S.: The NCSU Concurrency Workbench. In: Alur, R., Henzinger, T.A. (eds.) CAV 1996. LNCS, vol.\u00a01102, pp. 394\u2013397. Springer, Heidelberg (1996)"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/ICEBE.2007.11","volume-title":"Proc. of the IEEE International Conference on e-Business Engineering (ICEBE 2007)","author":"G. Dai","year":"2007","unstructured":"Dai, G., Bai, X., Zhao, C.: A Framework for Model Checking Web Service Compositions Based on BPEL4WS. In: Proc. of the IEEE International Conference on e-Business Engineering (ICEBE 2007), pp. 165\u2013172. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3233\/JCS-1994\/1995-3103","volume":"3","author":"R. Focardi","year":"1994","unstructured":"Focardi, R., Gorrieri, R.: A Classification of Security Properties for Process Algebras. Journal of Computer Security\u00a03(1), 5\u201333 (1994\/1995)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"65","DOI":"10.3233\/JCS-2006-14103","volume":"14","author":"R. Focardi","year":"2006","unstructured":"Focardi, R., Rossi, S.: Information Flow Security in Dynamic Contexts. Journal of Computer Security\u00a014(1), 65\u2013110 (2006)","journal-title":"Journal of Computer Security"},{"key":"7_CR14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/SP.1982.10014","volume-title":"Proc. of the IEEE Symposium on Security and Privacy (SSP 1982)","author":"J.A. Goguen","year":"1982","unstructured":"Goguen, J.A., Meseguer, J.: Security Policies and Security Models. In: Proc. of the IEEE Symposium on Security and Privacy (SSP 1982), pp. 11\u201320. IEEE Computer Society, Los Alamitos (1982)"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/0304-3975(82)90125-6","volume":"27","author":"D. Kozen","year":"1983","unstructured":"Kozen, D.: Results on the Propositional \u03bc-calculus. Theoretical Computer Science\u00a027, 333\u2013354 (1983)","journal-title":"Theoretical Computer Science"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-540-74407-8_15","volume-title":"CONCUR 2007 \u2013 Concurrency Theory","author":"C. Laneve","year":"2007","unstructured":"Laneve, C., Padovani, L.: The must Preorder Revisited. In: Caires, L., Vasconcelos, V.T. (eds.) CONCUR 2007. LNCS, vol.\u00a04703, pp. 212\u2013225. Springer, Heidelberg (2007)"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/3-540-60630-0_4","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Mader","year":"1995","unstructured":"Mader, A.: Modal \u03bc-calculus, Model Checking, and Gauss Elimination. In: Brinksma, E., Steffen, B., Cleaveland, W.R., Larsen, K.G., Margaria, T. (eds.) TACAS 1995. LNCS, vol.\u00a01019, pp. 72\u201388. Springer, Heidelberg (1995)"},{"key":"7_CR18","series-title":"Prentice Hall International Series in Computer Science","volume-title":"Communication and Concurrency","author":"R. Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice Hall International Series in Computer Science, vol.\u00a092. Prentice Hall, Englewood Cliffs (1989)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"M\u00fcller-Olm, M.: Derivation of Characteristic Formulae. Electronic Notes in Theoretical Computer Science 18 (1998)","DOI":"10.1016\/S1571-0661(05)80257-9"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/978-3-540-27834-4_60","volume-title":"Web Engineering","author":"S. Nakajima","year":"2004","unstructured":"Nakajima, S.: Model-Checking of Safety and Security Aspects in Web Service Flows. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol.\u00a03140, pp. 488\u2013501. Springer, Heidelberg (2004)"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.entcs.2005.07.038","volume":"151","author":"S. Nakajima","year":"2006","unstructured":"Nakajima, S.: Model-Checking Behavioral Specification of BPEL Applications. Electronic Notes in Theoretical Computer Science\u00a0151, 89\u2013105 (2006)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"1\/2","key":"7_CR22","doi-asserted-by":"publisher","first-page":"75","DOI":"10.3233\/JCS-2001-91-204","volume":"9","author":"P. Ryan","year":"2001","unstructured":"Ryan, P., Schneider, S.: Process Algebra and Non-Interference. Journal of Computer Security\u00a09(1\/2), 75\u2013103 (2001)","journal-title":"Journal of Computer Security"},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2004.11.011","volume":"126","author":"H. Schlingloff","year":"2005","unstructured":"Schlingloff, H., Martens, A., Schmidt, K.: Modeling and Model Checking Web Services. Electronic Notes in Theoretical Computer Science\u00a0126, 3\u201326 (2005)","journal-title":"Electronic Notes in Theoretical Computer Science"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Component Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27269-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T22:41:09Z","timestamp":1593556869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27269-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642272684","9783642272691"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27269-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}