{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:24:29Z","timestamp":1765887869136,"version":"3.37.3"},"reference-count":78,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["2015-ST-061-CIRC01"],"award-info":[{"award-number":["2015-ST-061-CIRC01"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/tr.2017.2665164","type":"journal-article","created":{"date-parts":[[2017,3,11]],"date-time":"2017-03-11T02:11:09Z","timestamp":1489198269000},"page":"529-546","source":"Crossref","is-referenced-by-count":11,"title":["An Approach for Identifying and Analyzing Implicit Interactions in Distributed Systems"],"prefix":"10.1109","volume":"66","author":[{"given":"Jason","family":"Jaskolka","sequence":"first","affiliation":[]},{"given":"John","family":"Villasenor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-655-9_3"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11741-001-0009-5"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44881-0_7"},{"key":"ref70","doi-asserted-by":"crossref","DOI":"10.1201\/9781420044829","author":"hsu","year":"2008","journal-title":"Graph Theory and Interconnection Networks"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574931"},{"key":"ref77","first-page":"179","article-title":"Example Problem: Batch Chemical Reactor","year":"1998","journal-title":"Guidelines for Design Solutions for Process Equipment Failures"},{"key":"ref74","first-page":"211","article-title":"Unifying models of data flow","author":"hoare","year":"2011","journal-title":"Proc 2010 Marktoberdorf Summer School Softw Syst Safety"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806122"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/360933.360975"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.226479"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.06.022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596807"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930149"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2011.04.005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2829949"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_16"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021804"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1999.779775"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008739929481"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/11609773_9"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18275-4_2"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1007\/978-3-642-35873-9_28","article-title":"All for the price of few (parameterized verification through view abstraction)","volume":"7737","author":"abdulla","year":"2013","journal-title":"Verification Model Checking and Abstract Interpretation ser Lecture Notes in Computer Science"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0018436"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46681-0_11"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BF02911258"},{"key":"ref65","first-page":"589","article-title":"Parameterized compositional model checking","volume":"9636","author":"namjoshi","year":"2016","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems (series Lecture Notes in Computer Science)"},{"article-title":"Operadic analysis of distributed systems","year":"2015","author":"schweiker","key":"ref66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04081-8_27"},{"journal-title":"Communication and Concurrency (Prentice-Hall International Series in Computer Science)","year":"1989","author":"milner","key":"ref67"},{"key":"ref68","first-page":"161","article-title":"A formulation of the potential for communication condition using C $^2$KA","volume":"161","author":"jaskolka","year":"2014","journal-title":"Games Automata Logics and Formal Verification (series Electronic Proceedings in Theoretical Computer Science)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2514\/6.2009-1882"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/11493402_15"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.726"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90008-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24590-1_12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.21236\/ADA455842"},{"key":"ref24","article-title":"Kommunikation mit automaten","volume":"1","author":"petri","year":"1962","journal-title":"Communication with automata"},{"journal-title":"A Practical Guide to SysML The Systems Modeling Language","year":"2011","author":"friedenthal","key":"ref23"},{"key":"ref26","first-page":"78","article-title":"On action algebras","author":"kozen","year":"1993","journal-title":"Logic and Information Flow"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360251"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/357084.357088"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01187-0_22"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/146637.146681"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.08.005"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5220\/0005670000990106"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542"},{"journal-title":"Safeware System Safety and Computers","year":"1995","author":"leveson","key":"ref54"},{"year":"1980","key":"ref53","article-title":"Procedures for performing a failure mode effect and criticality analysis"},{"key":"ref52","first-page":"111","article-title":"Securing UML information flow using flowUML","volume":"38","author":"alghathbar","year":"2006","journal-title":"J Res Pract Inf Technol"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06251-8_2"},{"article-title":"On the modelling, analysis, and mitigation of distributed covert channels","year":"2015","author":"jaskolka","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"ref12","first-page":"235","article-title":"A universal modular ACTOR formalism for artificial intelligence","author":"hewitt","year":"1973","journal-title":"Proc 3rd Int Joint Conf Artif Intell"},{"article-title":"Semantics of communicating parallel processes","year":"1975","author":"greif","key":"ref13"},{"article-title":"Laws for communicating parallel processes","year":"1977","author":"baker","key":"ref14"},{"article-title":"Foundations of actor semantics","year":"1981","author":"clinger","key":"ref15"},{"article-title":"ACTORS: A model of concurrent computation in distributed systems","year":"1985","author":"agha","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-10235-3","volume":"92","author":"milner","year":"1980","journal-title":"A Calculus of Communicating Systems (series Lecture Notes in Computer Science)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359576.359585"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(84)80025-X"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27914-5_9"},{"journal-title":"Engineering A Safer World Systems Thinking Applied to Safety","year":"2011","author":"leveson","key":"ref3"},{"journal-title":"Normal Accidents Living with High-Risk Technologies","year":"1984","author":"perrow","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/37.969131"},{"year":"2009","key":"ref8","article-title":"A Roadmap for Cybersecurity Research"},{"article-title":"Feds lack method to grade critical infrastructure cybersecurity","year":"2015","author":"bennett","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1996-42-304"},{"key":"ref9","first-page":"6","article-title":"Infrastructure resilience: Past, present, and future","volume":"11","author":"jackson","year":"2012","journal-title":"The CIP Report"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.04.033"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1994\/1995-3103"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-005-0179-x"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1134744.1134759"},{"key":"ref42","first-page":"160","article-title":"Toward a security domain model for static analysis and verification of information systems","author":"shaffer","year":"2007","journal-title":"7th OOPSLA Workshop on Domain-Specific Modeling"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1991.151586"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1990.128185"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229321"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/7936692\/07875503.pdf?arnumber=7875503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:14:44Z","timestamp":1642004084000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7875503\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":78,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2017.2665164","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2017,6]]}}}