{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:03Z","timestamp":1750221243194,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T00:00:00Z","timestamp":1529884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,25]]},"DOI":"10.1145\/3227609.3227676","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T19:30:44Z","timestamp":1530905444000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Structural modeling and verification of web applications"],"prefix":"10.1145","author":[{"given":"Mohammed","family":"Alzahrani","sequence":"first","affiliation":[{"name":"Albaha University, School of Computer Sciences and Information technology, Albaha, Saudi Arabia"}]},{"given":"Lilia","family":"Georgieva","sequence":"additional","affiliation":[{"name":"Heriot-Watt University, School of Mathematical and Computer Sciences, Edinburgh, UK"}]}],"member":"320","published-online":{"date-parts":[[2018,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"T. Amnell G. Behrmann J. Bengtsson P. Dargenio A. David A. Fehnker T. Hune B. Jeannet K. Larsen M. M\u00f6ller etal 2001. Uppaal-now next and future. Modeling and verification of parallel processes (2001).   T. Amnell G. Behrmann J. Bengtsson P. Dargenio A. David A. Fehnker T. Hune B. Jeannet K. Larsen M. M\u00f6ller et al. 2001. Uppaal-now next and future. Modeling and verification of parallel processes (2001).","DOI":"10.1007\/3-540-45510-8_4"},{"volume-title":"Spin: A Prototype Implementation","year":"1998","author":"Bosnacki D.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.12"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00040-2"},{"volume":"2","volume-title":"2nd International Conference on Industrial and Information Systems","author":"Cheng Y.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69850-0_1"},{"volume-title":"MCWEB: A Model-Checking Tool for Web Site Debugging.. In WWW Posters.","year":"2001","author":"De Alfaro L.","key":"e_1_3_2_1_8_1"},{"volume-title":"Proc. IEEE.","author":"Di Sciascio E.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_12_1","unstructured":"G. J. Holzmann. 2004. The SPIN model checker: Primer and reference manual. Addison-Wesley Professional.   G. J. Holzmann. 2004. The SPIN model checker: Primer and reference manual. Addison-Wesley Professional."},{"key":"e_1_3_2_1_13_1","unstructured":"A. Joesang. 1995. Security protocol verification using SPIN. (1995).  A. Joesang. 1995. Security protocol verification using SPIN. (1995)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11560548_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"P. Maggi and R. Sisto. 2002. Using SPIN to verify security properties of cryptographic protocols. In Model Checking Software. Springer 187--204.   P. Maggi and R. Sisto. 2002. Using SPIN to verify security properties of cryptographic protocols. In Model Checking Software. Springer 187--204.","DOI":"10.1007\/3-540-46017-9_14"},{"key":"e_1_3_2_1_16_1","unstructured":"B. Mordechai. 2008. Principles of the Spin model checker. Springer.  B. Mordechai. 2008. Principles of the Spin model checker. Springer."},{"key":"e_1_3_2_1_17_1","unstructured":"A. Tanenbaum. 2002. Computer Networks (4th ed.). Prentice Hall Professional Technical Reference.   A. Tanenbaum. 2002. Computer Networks (4th ed.). Prentice Hall Professional Technical Reference."},{"volume-title":"Lectures on Petri nets I: Basic models","author":"Valmari A.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"A. Valmari. 1998. The state explosion problem. Lectures on Petri Nets: advances in Petri Nets. Basic models (1998).  A. Valmari. 1998. The state explosion problem. Lectures on Petri Nets: advances in Petri Nets. Basic models (1998).","DOI":"10.1007\/3-540-65306-6_21"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.7.9.1941-1949"}],"event":{"name":"WIMS '18: 8th International Conference on Web Intelligence, Mining and Semantics","acronym":"WIMS '18","location":"Novi Sad Serbia"},"container-title":["Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3227609.3227676","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3227609.3227676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:32Z","timestamp":1750212452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3227609.3227676"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,25]]},"references-count":18,"alternative-id":["10.1145\/3227609.3227676","10.1145\/3227609"],"URL":"https:\/\/doi.org\/10.1145\/3227609.3227676","relation":{},"subject":[],"published":{"date-parts":[[2018,6,25]]},"assertion":[{"value":"2018-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}