{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:04:30Z","timestamp":1771704270701,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1109\/crisis.2008.4757466","type":"proceedings-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T16:03:38Z","timestamp":1232467418000},"page":"77-84","source":"Crossref","is-referenced-by-count":7,"title":["Verification of Workflow processes under multilevel security considerations"],"prefix":"10.1109","author":[{"given":"Kamel","family":"Barkaoui","sequence":"first","affiliation":[]},{"given":"Rahma Ben","family":"Ayed","sequence":"additional","affiliation":[]},{"given":"Hanifa","family":"Boucheneb","sequence":"additional","affiliation":[]},{"given":"Awatef","family":"Hicheur","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"verifiying entreprise's mandatory access control policies with colored petri nets","author":"juszczyszyn","year":"2003","journal-title":"Wroclaw University of Technology"},{"key":"17","article-title":"a strategy for an mls workflow management system","author":"myong","year":"1999","journal-title":"Proc IFIP 10th Working Conf Database Security"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1991.151582"},{"key":"18","article-title":"prt-net based analysis of information flow","author":"jjuopperi","year":"0","journal-title":"Research Report"},{"key":"15","article-title":"generalied soundness of workflow nets is decidable, icatpn 04","volume":"3099","author":"van hee","year":"2004","journal-title":"LNCS"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2005.10.035"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130769"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"12","author":"clavel","year":"2007","journal-title":"Maude manual (version2 3)"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/BF03219899"},{"key":"3","first-page":"90","article-title":"on the equivalence between deadlock freeness and liveness in petri nets","volume":"3536","author":"barkaoui","year":"2005","journal-title":"LNCS"},{"key":"20","first-page":"9","article-title":"multilevel security and information flow in petri net workflows","author":"knorr","year":"2001","journal-title":"3rd Int Conf Telecommun Syst Modeling Analysis"},{"key":"2","first-page":"82","article-title":"structural analysis of workflow nets with shared ressources","author":"barkaoui","year":"1998","journal-title":"Workflow Management Net-based Concepts Models Techniques and Tools (WFM'98) Computing Science Report"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.04.012"},{"key":"1","year":"0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1177\/0142331208095676"},{"key":"6","article-title":"verification parametree de la coherence des processus workflow","author":"barkaoui","year":"2007","journal-title":"MSR'07"},{"key":"5","year":"0"},{"key":"4","first-page":"239","article-title":"the bell-lapadula model","volume":"4","author":"bell","year":"1996","journal-title":"Computers & Security"},{"key":"9","first-page":"164","article-title":"how to specify non determinism and true concurrency with algebraic terms nets","volume":"655","author":"bettaz","year":"1992","journal-title":"LNCS"},{"key":"8","year":"0"}],"event":{"name":"2008 Third International Conference on Risks and Security of Internet and Systems( CRiSIS)","location":"Tozeur, Tunisia","start":{"date-parts":[[2008,10,28]]},"end":{"date-parts":[[2008,10,30]]}},"container-title":["2008 Third International Conference on Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733895\/4757450\/04757466.pdf?arnumber=4757466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T12:42:11Z","timestamp":1489668131000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4757466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/crisis.2008.4757466","relation":{},"subject":[],"published":{"date-parts":[[2008,10]]}}}