{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:08:26Z","timestamp":1769728106297,"version":"3.49.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst. Man Cybern, Syst."],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/tsmc.2013.2248358","type":"journal-article","created":{"date-parts":[[2013,6,6]],"date-time":"2013-06-06T14:11:39Z","timestamp":1370527899000},"page":"327-341","source":"Crossref","is-referenced-by-count":65,"title":["Modeling and Validating E-Commerce Business Process Based on Petri Nets"],"prefix":"10.1109","volume":"44","author":[{"given":"WangYang","family":"Yu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Tongji University, Shanghai, China"}]},{"given":"ChunGang","family":"Yan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Tongji University, Shanghai, China"}]},{"given":"ZhiJun","family":"Ding","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Tongji University, Shanghai, China"}]},{"given":"ChangJun","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Tongji University, Shanghai, China"}]},{"given":"MengChu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering and the Discrete Event Systems Laboratory, New Jersey Institute of Technology, Newark, NJ, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2008.916747"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/9781118554609"},{"key":"ref33","author":"li","year":"2009","journal-title":"Deadlock Resolution in Automated Manufacturing Systems A Novel Petri Net Approach"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/b95112"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CECandEEE.2008.106"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3126-5"},{"key":"ref36","author":"wu","year":"2010","journal-title":"System Modeling and Control with Resource-Oriented Petri Nets"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1142\/3376"},{"key":"ref34","author":"hr\ufffdz","year":"2007","journal-title":"Modeling and Control of Discrete-Event Dynamic Systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706350"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.896995"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.1999.805074"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286420"},{"key":"ref13","first-page":"1","article-title":"Verification of security properties in electronic payment protocols","author":"panti","year":"2002","journal-title":"Proc ACM SIGPLAN IFIP WG"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WECWIS.2000.853873"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2003.10.011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(01)00141-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IC4E.2010.96"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.843181"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF02944798"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2011.08.004"},{"key":"ref4","author":"pfitzmann","year":"1996","journal-title":"Properties of payment systems General definiton scetch and classification"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00321-2"},{"key":"ref3","first-page":"297","article-title":"Web services enabling virtual enterprise transactions","author":"georgiadis","year":"2006","journal-title":"Proc Int Conf E-Commerce"},{"key":"ref6","year":"2011","journal-title":"26th China Internet Development Statistics Report"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2007.33"},{"key":"ref5","first-page":"465","article-title":"How to shop for free online?security analysis of cashier-as-a-service based web stores","author":"wang","year":"2011","journal-title":"Proc 10th IEEE Symp Security Privacy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/248052.248054"},{"key":"ref7","first-page":"18","article-title":"Model checking electronic commerce protocols","author":"heintze","year":"1996","journal-title":"Proc 2nd Usenix Workshop Electron Commerce"},{"key":"ref2","year":"2012","journal-title":"One Yuan Gate Event of Taobao"},{"key":"ref1","year":"2011","journal-title":"Q4 and Full-Year E-Commerce Core Data"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74810-6_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36103-0_20"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/3477.865173"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2012.2186440"},{"key":"ref22","author":"neumann","year":"2004","journal-title":"Principled Assuredly Trustworthy Composable Architectures"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.01.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.11.025"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2037018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.2010751"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2007.902622"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(99)00038-5"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2157136"},{"key":"ref25","first-page":"407","article-title":"Verification of workflow nets","author":"van der aalst","year":"1997","journal-title":"Proc ICATPN LNCS 1248"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2012.2204741"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics: Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221021\/6739146\/06525422.pdf?arnumber=6525422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T18:06:20Z","timestamp":1753207580000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6525422\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":46,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tsmc.2013.2248358","relation":{},"ISSN":["2168-2216","2168-2232"],"issn-type":[{"value":"2168-2216","type":"print"},{"value":"2168-2232","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3]]}}}