{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:36:58Z","timestamp":1725896218613},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642307287"},{"type":"electronic","value":"9783642307294"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30729-4_1","type":"book-chapter","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T08:49:46Z","timestamp":1340786986000},"page":"1-20","source":"Crossref","is-referenced-by-count":2,"title":["Contribution to a Rigorous Analysis of Web Application Frameworks"],"prefix":"10.1007","author":[{"given":"Egon","family":"B\u00f6rger","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Cisternino","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Gervasi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Java Server Faces, \n                  \n                    http:\/\/www.jcp.org\/en\/jsr\/detail?id=314"},{"key":"1_CR2","unstructured":"Python, \n                  \n                    http:\/\/www.python.org\/"},{"key":"1_CR3","unstructured":"Tomcat, \n                  \n                    http:\/\/tomcat.apache.org\/"},{"key":"1_CR4","unstructured":"ECMAScript language specification. Standard ECMA-262, Edition 5.1 (June 2011), \n                  \n                    http:\/\/www.ecma-international.org\/publications\/standards\/Ecma-262.htm"},{"key":"1_CR5","unstructured":"HTTP1.1 part 2 message semantics, \n                  \n                    http:\/\/www.ietf.org\n                  \n                  \n                 (cosulted February 2012)"},{"key":"1_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139195881","volume-title":"Modeling in Event-B: System and Software Engineering","author":"J.-R. Abrial","year":"2010","unstructured":"Abrial, J.-R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press, Cambridge (2010)"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1504\/IJBPIM.2006.012625","volume":"1","author":"M. Altenhofen","year":"2006","unstructured":"Altenhofen, M., B\u00f6rger, E., Friesen, A., Lemcke, J.: A high-level specification for virtual providers. IJBPIM\u00a01(4), 267\u2013278 (2006)","journal-title":"IJBPIM"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/11576280_2","volume-title":"Formal Methods and Software Engineering","author":"A. Barros","year":"2005","unstructured":"Barros, A., B\u00f6rger, E.: A Compositional Framework for Service Interaction Patterns and Interaction Flows. In: Lau, K.-K., Banach, R. (eds.) ICFEM 2005. LNCS, vol.\u00a03785, pp. 5\u201335. Springer, Heidelberg (2005)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"B\u00f6rger, E.: Approaches to modeling business processes. A critical analysis of BPMN, workflow patterns and YAWL. JSSM, 1\u201314 (2011), doi:10.1007\/s10270-011-0214-z","DOI":"10.1007\/s10270-011-0214-z"},{"issue":"3","key":"1_CR10","first-page":"939","volume":"78","author":"E. B\u00f6rger","year":"2012","unstructured":"B\u00f6rger, E., Cisternino, A., Gervasi, V.: Ambient Abstract State Machines with applications. JCSS\u00a078(3), 939\u2013959 (2012)","journal-title":"JCSS"},{"issue":"2-3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.tcs.2004.11.008","volume":"336","author":"E. B\u00f6rger","year":"2005","unstructured":"B\u00f6rger, E., Fruja, G., Gervasi, V., St\u00e4rk, R.: A high-level modular definition of the semantics of C#. Theoretical Computer Science\u00a0336(2-3), 235\u2013284 (2005)","journal-title":"Theoretical Computer Science"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"B\u00f6rger, E., St\u00e4rk, R.F.: Abstract State Machines. A Method for High-Level System Design and Analysis. Springer (2003)","DOI":"10.1007\/978-3-642-18216-7"},{"key":"1_CR13","unstructured":"Brown, M.R.: Fast CGI specification (April 1996), \n                  \n                    http:\/\/www.fastcgi.com\/"},{"key":"1_CR14","unstructured":"Dittamo, C., Gervasi, V., B\u00f6rger, E., Cisternino, A.: A formal specification of the semantics of ECMAScript. In: VSTTE 2010, Edinburgh, Poster session (2010)"},{"issue":"3","key":"1_CR15","first-page":"176","volume":"72","author":"N.G. Fruja","year":"2008","unstructured":"Fruja, N.G.: Towards proving type safety of .NET CIL. SCP\u00a072(3), 176\u2013219 (2008)","journal-title":"SCP"},{"issue":"3","key":"1_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.5381\/jot.2006.5.3.a1","volume":"5","author":"N.G. Fruja","year":"2006","unstructured":"Fruja, N.G., B\u00f6rger, E.: Modeling the.NET CLR Exception Handling Mechanism for a Mathematical Analysis. Journal of Object Technology\u00a05(3), 5\u201334 (2006)","journal-title":"Journal of Object Technology"},{"key":"1_CR17","series-title":"LNCS","volume-title":"Proceedings ABZ 2012","author":"V. Gervasi","year":"2012","unstructured":"Gervasi, V.: An ASM model of concurrency in a web browser. In: Proceedings ABZ 2012. LNCS. Springer, Heidelberg (2012)"},{"key":"1_CR18","unstructured":"Hohpe, G., Woolf, B.: Enterprise Integration Patterns: Designing, Building and Deploying Messaging Solutions. Addison-Wesley Longman Publishing (2003)"},{"key":"1_CR19","unstructured":"Microsoft. ASP.NET, \n                  \n                    http:\/\/www.asp.net"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Schellhorn, G., Ahrendt, W.: The WAM case study: Verifying compiler correctness for Prolog with KIV. In: Bibel, W., Schmitt, P. (eds.) Automated Deduction \u2013 A Basis for Applications, vol.\u00a0III, pp. 165\u2013194 (1998)","DOI":"10.1007\/978-94-017-0437-3_7"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/11813040_2","volume-title":"FM 2006: Formal Methods","author":"G. Schellhorn","year":"2006","unstructured":"Schellhorn, G., Grandy, H., Haneberg, D., Reif, W.: The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. In: Misra, J., Nipkow, T., Karakostas, G. (eds.) FM 2006. LNCS, vol.\u00a04085, pp. 16\u201331. Springer, Heidelberg (2006)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"St\u00e4rk, R.F., Schmid, J., B\u00f6rger, E.: Java and the Java Virtual Machine: Definition, Verification, Validation. Springer (2001)","DOI":"10.1007\/978-3-642-59495-3"},{"key":"1_CR23","unstructured":"W3C. CGI: Common Gateway Interface, \n                  \n                    http:\/\/www.w3.org\/CGI\/"}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30729-4_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:28:51Z","timestamp":1620127731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30729-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642307287","9783642307294"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30729-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}