{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:37:02Z","timestamp":1730313422864,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,3,13]]},"DOI":"10.1145\/1066677.1066864","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"815-820","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An approach to handle real time and probabilistic behaviors in e-commerce"],"prefix":"10.1145","author":[{"given":"G.","family":"Diaz","sequence":"first","affiliation":[{"name":"University of Castilla-La Mancha, Campus Universitario, Albacete, Spain"}]},{"given":"K.","family":"Larsen","sequence":"additional","affiliation":[{"name":"Aalborg University, Aalborg East, Denmark"}]},{"given":"J.","family":"Pardo","sequence":"additional","affiliation":[{"name":"University of Castilla-La Mancha, Campus Universitario, Albacete, Spain"}]},{"given":"F.","family":"Cuartero","sequence":"additional","affiliation":[{"name":"University of Castilla-La Mancha, Campus Universitario, Albacete, Spain"}]},{"given":"V.","family":"Valero","sequence":"additional","affiliation":[{"name":"University of Castilla-La Mancha, Campus Universitario, Albacete, Spain"}]}],"member":"320","published-online":{"date-parts":[[2005,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"685","volume-title":"Probabilistic process algebra. E-HPA","author":"Jonsson K. Larsen B.","year":"2001","unstructured":"K. Larsen B. Jonsson and W. Yi . Probabilistic process algebra. E-HPA , chapter 4: Extensions, pages 685 -- 710 . 2001 .]] K. Larsen B. Jonsson and W. Yi. Probabilistic process algebra. E-HPA, chapter 4: Extensions, pages 685--710. 2001.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"New Generation of UPPAAL. In Int. Workshop on Software Tools for Technology Transfer","author":"Bengtsson J.","year":"1998","unstructured":"J. Bengtsson , K. Larsen , F. Larsson , P. Petterson , Yi Wang , and C. Weise . New Generation of UPPAAL. In Int. Workshop on Software Tools for Technology Transfer , June 1998 .]] J. Bengtsson, K. Larsen, F. Larsson, P. Petterson, Yi Wang, and C. Weise. New Generation of UPPAAL. In Int. Workshop on Software Tools for Technology Transfer, June 1998.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/794197.795083"},{"key":"e_1_3_2_1_4_1","volume-title":"On distributed security transactions that use secure transport protocols","author":"Broadfoot P.","year":"2003","unstructured":"P. Broadfoot and G. Lowe . On distributed security transactions that use secure transport protocols , 2003 .]] P. Broadfoot and G. Lowe. On distributed security transactions that use secure transport protocols, 2003.]]"},{"key":"e_1_3_2_1_5_1","volume-title":"PAPM-PROBMIV 2002","volume":"2399","author":"D'Argenio P.","year":"2002","unstructured":"P. D'Argenio , B., H. Jensen , and K. Larsen . Reduction and refinement strategies for probabilistic analysis. In Process Algebra and Probabilistic Methods - Performance Modelling and Verification , PAPM-PROBMIV 2002 , volume 2399 of LNCS, Copenhagen (Denmark ), July 2002 .]] P. D'Argenio, B., H. Jensen, and K. Larsen. Reduction and refinement strategies for probabilistic analysis. In Process Algebra and Probabilistic Methods - Performance Modelling and Verification, PAPM-PROBMIV 2002, volume 2399 of LNCS, Copenhagen (Denmark), July 2002.]]"},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","volume-title":"PAPM-PROBM","author":"D'Argenio P.","year":"2001","unstructured":"P. D'Argenio , B. Jeannet , H. Jensen , and K. Larsen . Reachability analysis of probabilistic systems by successive refinements . In PAPM-PROBM 2001 , volume 2165 of LNCS , Aachen (Germany) .]] P. D'Argenio, B. Jeannet, H. Jensen, and K. Larsen. Reachability analysis of probabilistic systems by successive refinements. In PAPM-PROBM 2001, volume 2165 of LNCS, Aachen (Germany).]]"},{"key":"e_1_3_2_1_7_1","volume-title":"19th Annual UK Performance Engineering Workshop","author":"D\u00edaz G.","year":"2003","unstructured":"G. D\u00edaz , D. Cazorla , F. Pelayo , F. Cuartero , and V. Valero . Verifying and capturing probabilistic bechaviours of real-time systems . In 19th Annual UK Performance Engineering Workshop , 2003 .]] G. D\u00edaz, D. Cazorla, F. Pelayo, F. Cuartero, and V. Valero. Verifying and capturing probabilistic bechaviours of real-time systems. In 19th Annual UK Performance Engineering Workshop, 2003.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/967900.968063"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Concurrency Theory, CONCUR'02","author":"Jeannet B.","year":"2002","unstructured":"B. Jeannet , P. D'Argenio , and K. Larsen . RAPTURE: A tool for verifying markov decision processes. In Tools Day , International Conference on Concurrency Theory, CONCUR'02 , Brno (Czech Republic ), August 2002 . Technical Report, Faculty of Informatics at Masaryk University Brno.]] B. Jeannet, P. D'Argenio, and K. Larsen. RAPTURE: A tool for verifying markov decision processes. In Tools Day, International Conference on Concurrency Theory, CONCUR'02, Brno (Czech Republic), August 2002. Technical Report, Faculty of Informatics at Masaryk University Brno.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050010"},{"key":"e_1_3_2_1_11_1","volume-title":"Wang Yi. Efficient Verification of Real-Time Systems: Compact Data Structures and State-Space Reduction. In Proc. of the 18th IEEE Real-Time Systems Symposium","author":"Larsson F.","year":"1997","unstructured":"F. Larsson , K. Larsen , P. Pettersson , and Wang Yi. Efficient Verification of Real-Time Systems: Compact Data Structures and State-Space Reduction. In Proc. of the 18th IEEE Real-Time Systems Symposium , 1997 .]] F. Larsson, K. Larsen, P. Pettersson, and Wang Yi. Efficient Verification of Real-Time Systems: Compact Data Structures and State-Space Reduction. In Proc. of the 18th IEEE Real-Time Systems Symposium, 1997.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/794198.795103"},{"key":"e_1_3_2_1_13_1","series-title":"Willey series in probability and mathematical statistics","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316887","volume-title":"Markov Decision Processes: Discrete Stochastic Dynamic Programming","author":"Puterman M.L.","year":"1994","unstructured":"M.L. Puterman . Markov Decision Processes: Discrete Stochastic Dynamic Programming . Willey series in probability and mathematical statistics . Jhon Wiley and Sons , 1994 .]] M.L. Puterman. Markov Decision Processes: Discrete Stochastic Dynamic Programming. Willey series in probability and mathematical statistics. Jhon Wiley and Sons, 1994.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/794198.795104"},{"key":"e_1_3_2_1_15_1","volume-title":"Modelling and Analysis of Security Protocols","author":"Ryan P.","year":"2001","unstructured":"P. Ryan , S. Schneider , M. Goldsmith , G. Lowe , and B. Roscoe . Modelling and Analysis of Security Protocols . Addison Wesley , 2001 .]] P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. Modelling and Analysis of Security Protocols. Addison Wesley, 2001.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"Set secure electronic transaction specification: Business description","author":"Mastercard","year":"1997","unstructured":"Mastercard & VISA. Set secure electronic transaction specification: Business description , 1997 .]] Mastercard & VISA. Set secure electronic transaction specification: Business description, 1997.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"Set secure electronic transaction specification: Formal protocol definition","author":"Mastercard","year":"1997","unstructured":"Mastercard & VISA. Set secure electronic transaction specification: Formal protocol definition , 1997 .]] Mastercard & VISA. Set secure electronic transaction specification: Formal protocol definition, 1997.]]"},{"key":"e_1_3_2_1_18_1","volume-title":"Set secure electronic transaction specification: Programmer's guide","author":"Mastercard","year":"1997","unstructured":"Mastercard & VISA. Set secure electronic transaction specification: Programmer's guide , 1997 .]] Mastercard & VISA. Set secure electronic transaction specification: Programmer's guide, 1997.]]"}],"event":{"name":"SAC05: The 2005 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Santa Fe New Mexico","acronym":"SAC05"},"container-title":["Proceedings of the 2005 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1066677.1066864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T19:26:38Z","timestamp":1673119598000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1066677.1066864"}},"subtitle":["validating the SET protocol"],"short-title":[],"issued":{"date-parts":[[2005,3,13]]},"references-count":18,"alternative-id":["10.1145\/1066677.1066864","10.1145\/1066677"],"URL":"https:\/\/doi.org\/10.1145\/1066677.1066864","relation":{},"subject":[],"published":{"date-parts":[[2005,3,13]]},"assertion":[{"value":"2005-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}