{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:48:01Z","timestamp":1771699681857,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Sci. Eng."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/tase.2014.2362819","type":"journal-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T01:06:35Z","timestamp":1421715995000},"page":"647-662","source":"Crossref","is-referenced-by-count":38,"title":["Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns"],"prefix":"10.1109","volume":"13","author":[{"given":"WangYang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Chun Gang","family":"Yan","sequence":"additional","affiliation":[]},{"given":"ZhiJun","family":"Ding","sequence":"additional","affiliation":[]},{"given":"ChangJun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"MengChu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36285-9_69"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36285-9_67"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2012.2188511"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.2010751"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.896995"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2011.08.004"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36285-9_65"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36285-9_66"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2009.2034016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2008.916747"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2013.2285574"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/TII.2012.2198661","article-title":"Deadlock-free control of automated manufacturing systems with flexible routes and assembly operations using Petri nets","volume":"9","author":"hesuan","year":"2013","journal-title":"IEEE Trans Ind Informat"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2012.2190139"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2011.08.003"},{"key":"ref2","first-page":"465","article-title":"How to shop for free online?security analysis of cashier-as-a-Service based web stores","author":"wang","year":"2011","journal-title":"Proc 32nd IEEE Symp Security Privacy (SP'11)"},{"key":"ref1","year":"2014","journal-title":"IResearch 2014 Q2 e-commerce market core data"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2013.2288645"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2239995"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2013.2241762"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2009.426"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2012.2202108"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2012.2235427"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2011.6059137"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2011.5772349"},{"key":"ref51","year":"0","journal-title":"PayPal"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2258907"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2283034"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2013.2253552"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2012.2187890"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2406336.2406340"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2010.2046412"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2034837"},{"key":"ref52","year":"0","journal-title":"Alipay"},{"key":"ref10","article-title":"Department of defense trusted computer system evaluation criteria","volume":"5200 28 std ed","author":"latham","year":"1985","journal-title":"U S Dept of Defense"},{"key":"ref11","first-page":"427","article-title":"Specification and verification of security properties of e-Contracts","author":"kalam","year":"2010","journal-title":"Proc 8th Int Conf Commun"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321692"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/248052.248054"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74810-6_1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706350"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2003.10.011"},{"key":"ref16","first-page":"303","article-title":"IEEE, analyzing a fair exchange E-commerce protocol using CSP and FDR","author":"wang","year":"2010","journal-title":"Proc Int Conf E-Edu E-Bus E-Manage E-Learn"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.843181"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.01.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.11.025"},{"key":"ref4","author":"hoglund","year":"2004","journal-title":"Exploiting Software How to Break Code"},{"key":"ref3","first-page":"297","article-title":"Web services enabling virtual enterprise transactions","author":"georgiadis","year":"2006","journal-title":"IADIS Int conf e-Commerce"},{"key":"ref6","year":"0","journal-title":"State of application security report"},{"key":"ref5","author":"viega","year":"2006","journal-title":"Building Secure Software"},{"key":"ref8","author":"swiderski","year":"2009","journal-title":"Threat Modeling"},{"key":"ref7","first-page":"100","article-title":"Principled assuredly trustworthy composable architectures","author":"neumann","year":"2004","journal-title":"Computer Science Laboratory SRI International"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1142\/3376"},{"key":"ref9","author":"mcclure","year":"2003","journal-title":"Web Hacking Attacks And Defense"},{"key":"ref46","first-page":"1","article-title":"A rigorous methodology for security architecture modeling and verification","author":"ali","year":"2009","journal-title":"Proc 42nd Hawaii Int Conf Syst Sci"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.40"},{"key":"ref48","author":"hr\ufffdz","year":"2007","journal-title":"Modeling and Control of Discrete-Event Dynamic Systems"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/b95112"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36285-9_68"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1159030"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21834-7_17"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.06.002"}],"container-title":["IEEE Transactions on Automation Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8856\/7447676\/6960112.pdf?arnumber=6960112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:28Z","timestamp":1642004908000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6960112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":60,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tase.2014.2362819","relation":{},"ISSN":["1545-5955","1558-3783"],"issn-type":[{"value":"1545-5955","type":"print"},{"value":"1558-3783","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}