{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:40:03Z","timestamp":1750210803031,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Major Program for Scientific and Technological of Anhui Province","award":["17030901026"],"award-info":[{"award-number":["17030901026"]}]},{"name":"Key Technologies R&D Program of Anhui Province","award":["1804a09020058"],"award-info":[{"award-number":["1804a09020058"]}]},{"name":"Talent Research Foundation Project of Hefei University","award":["16-17RC23"],"award-info":[{"award-number":["16-17RC23"]}]},{"name":"National Natural Science Foundation of China","award":["61806068, 61672204"],"award-info":[{"award-number":["61806068, 61672204"]}]},{"name":"Visiting Scholar at Home and Aboard Funded Project of Universities of Anhui Province","award":["gxfxZD2016209"],"award-info":[{"award-number":["gxfxZD2016209"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316714","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"210-216","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Verifying Cloud Application for the Interaction Correctness Using SoaML and SPIN"],"prefix":"10.1145","author":[{"given":"Chunling","family":"Hu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Hefei University, Hefei, China"}]},{"given":"Guoqing","family":"Geng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Southeast University, Nanjing, China"}]},{"given":"Bixin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Southeast University, Nanjing, China"}]},{"given":"Chao","family":"Tang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Hefei University, Hefei, China"}]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Hefei University, Hefei, China"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-015-9337-8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786826"},{"key":"e_1_3_2_1_4_1","volume-title":"The MODAClouds Approach{M}","author":"Model-Driven Development","year":"2017","unstructured":"Model-Driven Development and Operation of Multi-Cloud Applications : The MODAClouds Approach{M} . Springer , 2017 . Model-Driven Development and Operation of Multi-Cloud Applications: The MODAClouds Approach{M}. Springer, 2017."},{"volume-title":"2015 International Conference on. IEEE","author":"Puthal D","key":"e_1_3_2_1_5_1","unstructured":"Puthal D , Sahoo B P S , Mishra S , Cloud computing features, issues, and challenges: a big picture{C}\/\/Computational Intelligence and Networks (CINE) , 2015 International Conference on. IEEE , 2015: 116--123. Puthal D, Sahoo B P S, Mishra S, et al. Cloud computing features, issues, and challenges: a big picture{C}\/\/Computational Intelligence and Networks (CINE), 2015 International Conference on. IEEE, 2015: 116--123."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.031"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.07.006"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.25"},{"key":"e_1_3_2_1_10_1","volume-title":"Domain-specific languages{M}. Pearson Education","author":"Fowler M.","year":"2010","unstructured":"Fowler M. Domain-specific languages{M}. Pearson Education , 2010 . Fowler M. Domain-specific languages{M}. Pearson Education, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2378496"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2008.52"},{"key":"e_1_3_2_1_13_1","first-page":"276","article-title":"Specifying Services using the Service Oriented Architecture Modeling Language (SoaML)-A Baseline for Specification of Cloud-based Services{C}","volume":"2011","author":"Elves\u00e6ter B","unstructured":"Elves\u00e6ter B , Berre A J , Sadovykh A . Specifying Services using the Service Oriented Architecture Modeling Language (SoaML)-A Baseline for Specification of Cloud-based Services{C} . CLOSER. 2011 : 276 -- 285 . Elves\u00e6ter B, Berre A J, Sadovykh A. Specifying Services using the Service Oriented Architecture Modeling Language (SoaML)-A Baseline for Specification of Cloud-based Services{C}. CLOSER. 2011: 276--285.","journal-title":"CLOSER."},{"key":"e_1_3_2_1_14_1","volume-title":"Integrated Service Engineering (ISE) Framework: Development of Business Services for Ecosystems in the Internet of Services{M}","author":"Spath D","year":"2011","unstructured":"Spath D , Raffler H , Kett H , Integrated Service Engineering (ISE) Framework: Development of Business Services for Ecosystems in the Internet of Services{M} . Fraunhofer-Verlag , 2011 . Spath D, Raffler H, Kett H, et al. Integrated Service Engineering (ISE) Framework: Development of Business Services for Ecosystems in the Internet of Services{M}. Fraunhofer-Verlag, 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"Technische Universit\u00e4t","author":"Bleikertz S.","year":"2017","unstructured":"Bleikertz S. Automated Security Analysis of Virtualized Infrastructures{D} . Technische Universit\u00e4t , 2017 . Bleikertz S. Automated Security Analysis of Virtualized Infrastructures{D}. Technische Universit\u00e4t, 2017."},{"key":"e_1_3_2_1_16_1","article-title":"Efficient provisioning of security service function chaining using network security defense patterns{J}","author":"Sendi A S","year":"2016","unstructured":"Sendi A S , Jarraya Y , Pourzandi M , Efficient provisioning of security service function chaining using network security defense patterns{J} . IEEE Transactions on Services Computing , 2016 . Sendi A S, Jarraya Y, Pourzandi M, et al. Efficient provisioning of security service function chaining using network security defense patterns{J}. IEEE Transactions on Services Computing, 2016.","journal-title":"IEEE Transactions on Services Computing"},{"volume-title":"2015 11th International Conference on. IEEE","author":"Guermazi E","key":"e_1_3_2_1_17_1","unstructured":"Guermazi E , Ben-Abdallah H , Ayed M B . Modeling a secure cloud data warehouse with SoaML{C}\/\/Information Assurance and Security (IAS) , 2015 11th International Conference on. IEEE , 2015: 55--60. Guermazi E, Ben-Abdallah H, Ayed M B. Modeling a secure cloud data warehouse with SoaML{C}\/\/Information Assurance and Security (IAS), 2015 11th International Conference on. IEEE, 2015: 55--60."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-014-0331-x"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31759-0_12"}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:12Z","timestamp":1750208532000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316714"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":19,"alternative-id":["10.1145\/3316615.3316714","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316714","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}