{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T16:48:20Z","timestamp":1770914900789,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642324383","type":"print"},{"value":"9783642324390","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32439-0_7","type":"book-chapter","created":{"date-parts":[[2012,8,7]],"date-time":"2012-08-07T21:20:09Z","timestamp":1344374409000},"page":"109-121","source":"Crossref","is-referenced-by-count":1,"title":["An Architectural Style for Trustworthy Adaptive Service Based Applications"],"prefix":"10.1007","author":[{"given":"Leszek A.","family":"Maciaszek","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Alur, D., Crupi, J., Malks, D.: Core J2EE Patterns: Best Practices and Design Strategies, 2nd edn., 528 p. Prentice Hall (2003)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Artz, D., Gil, Y.: A Survey of Trust in Computer Science and the Semantic Web. Journal of Web Semantics: Science, Services and Agents on the World Wide Web, 40 p. (2007), \n                    \n                      http:\/\/www.isi.edu\/~gil\/papers\/jws-trust-07.pdf","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Capra, F.: The Turning Point. Science, Society, and the Rising Culture, 516 p. Flamingo (1982)","DOI":"10.1063\/1.2914857"},{"issue":"4","key":"7_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/1053291.1053294","volume":"48","author":"E. Christiaanse","year":"2005","unstructured":"Christiaanse, E.: Performance Benefits Through Integration Hubs. Comm. ACM\u00a048(4), 95\u2013100 (2005)","journal-title":"Comm. ACM"},{"key":"7_CR5","unstructured":"Cloud Computing, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Cloud_computing"},{"issue":"6","key":"7_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1002\/cplx.10043","volume":"7","author":"P.A. Corning","year":"2002","unstructured":"Corning, P.A.: The Re-Emergence of \u201cEmergence\u201d: A Venerable Concept in Search of a Theory. Complexity\u00a07(6), 18\u201330 (2002)","journal-title":"Complexity"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Fensel, D., Lausen, H., Polleres, A., de Bruijn, J., Stollberg, M., Roman, D., Dominigue, J.: Enabling Semantic Web Services. The Web Service Modeling Ontology, 190 p. Springer (2007)","DOI":"10.1007\/978-3-540-34520-6"},{"key":"7_CR8","unstructured":"ISO 9126 Software Quality Characteristics, \n                    \n                      http:\/\/www.sqa.net\/iso9126.html"},{"key":"7_CR9","unstructured":"Jackson, M.: Systems Thinking: Creative Holism for Managers, 352 p. John Wiley & Sons, Ltd. (2003)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Kanitscheider, B.: Beyond Reductionism and Holism. The Approach to Synergetics. In: Agazzi, E., Montecucco, L. (eds.) Complexity and Emergence. Proceedings of the Annual Meeting of the International Academy of the Philosophy of Science, pp. 39\u201344. World Scientific (2002)","DOI":"10.1142\/9789812776617_0004"},{"key":"7_CR11","unstructured":"Koestler, A.: Bricks to Babel, 697 p. Random House (1980)"},{"key":"7_CR12","unstructured":"Koestler, A.: The Ghost in the Machine, 384 p. Hutchinson(1967)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Looijen, R.C.: Holism and Reductionism in Biology and Ecology. The Mutual Dependence of Higher and Lower Level Research Programmes, 350 p. Kluwer Academic Publishers (2000)","DOI":"10.1007\/978-94-015-9560-5_1"},{"key":"7_CR14","series-title":"CCIS","first-page":"3","volume-title":"ICSOFT 2006","author":"L.A. Maciaszek","year":"2008","unstructured":"Maciaszek, L.A.: Adaptive Integration of Enterprise and B2B Applications. In: Filipe, J., Shishkov, B., Helfert, M. (eds.) ICSOFT 2006. CCIS, vol.\u00a010, pp. 3\u201315. Springer, Heidelberg (2008)"},{"issue":"1-2","key":"7_CR15","first-page":"1","volume":"19","author":"L.A. Maciaszek","year":"2007","unstructured":"Maciaszek, L.A.: An Investigation of Software Holons \u2013 the \u2018adHOCS\u2019 Approach. Argumenta Oeconomica\u00a019(1-2), 1\u201340 (2007)","journal-title":"Argumenta Oeconomica"},{"key":"7_CR16","unstructured":"Maciaszek, L.A.: Dependency Structure Analysis for Managing Architectural Intent. In: Huzar, Z., Mazur, Z. (eds.) In\u017cynieria Oprogramowania \u2013 Od Teorii do Praktyki, pp. 13\u201326. Wydawnictwa Komunikacji i \u0141\u0105czno\u015bci, Warszawa (2008) (in Polish, but English version available from the author)"},{"key":"7_CR17","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-01344-7_2","volume-title":"Web Information Systems and Technologies","author":"L.A. Maciaszek","year":"2009","unstructured":"Maciaszek, L.A.: Architecture-Centric Software Quality Management. In: Cordeiro, J., Hammoudi, S., Filipe, J. (eds.) WEBIST 2008. LNBIP, vol.\u00a018, pp. 11\u201326. Springer, Heidelberg (2009)"},{"key":"7_CR18","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-0-387-39388-9_1","volume-title":"Software Engineering Techniques: Design for Quality","author":"L.A. Maciaszek","year":"2006","unstructured":"Maciaszek, L.A.: From Hubs Via Holons to an Adaptive Meta-Architecture \u2013 the \u201cAD-HOC\u201d Approach. In: Sacha, K. (ed.) Software Engineering Techniques: Design for Quality. IFIP, vol.\u00a0227, pp. 1\u201313. Springer, Boston (2006)"},{"key":"7_CR19","unstructured":"Maciaszek, L.A., Liong, B.L.: Practical Software Engineering. A Case-Study Approach, 864 p. Addison-Wesley (2005)"},{"key":"7_CR20","unstructured":"Maciaszek, L.A.: Requirements Analysis and System Design, 3rd edn., 642 p. Addison-Wesley (2007)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Petrie, C., Bussler, C.: The Myth of Open Web Services. The Rise of the Service Parks. IEEE Internet Computing, 80\u201382 (May-June 2008)","DOI":"10.1109\/MIC.2008.65"},{"key":"7_CR22","unstructured":"Rozanski, N., Woods, E.: Software Systems Architecture, 530 p. Addison-Wesley (2005)"},{"issue":"5","key":"7_CR23","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/253769.253801","volume":"40","author":"P. Wegner","year":"1997","unstructured":"Wegner, P.: Why interaction is more powerful than algorithms. Comm. ACM\u00a040(5), 80\u201391 (1997)","journal-title":"Comm. ACM"}],"container-title":["Lecture Notes in Computer Science","Business System Management and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32439-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T19:00:25Z","timestamp":1557169225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32439-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642324383","9783642324390"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32439-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}