{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:22:01Z","timestamp":1709832121382},"reference-count":30,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2009,3,1]],"date-time":"2009-03-01T00:00:00Z","timestamp":1235865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1016\/j.ins.2008.11.025","type":"journal-article","created":{"date-parts":[[2008,12,4]],"date-time":"2008-12-04T05:28:15Z","timestamp":1228368495000},"page":"995-1006","source":"Crossref","is-referenced-by-count":40,"title":["Modeling and monitoring of E-commerce workflows"],"prefix":"10.1016","volume":"179","author":[{"given":"YuYue","family":"Du","sequence":"first","affiliation":[]},{"given":"ChangJun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"MengChu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"You","family":"Fu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2008.11.025_bib1","series-title":"Verification of Workflow Nets","author":"van der Aalst","year":"1997"},{"issue":"3","key":"10.1016\/j.ins.2008.11.025_bib2","first-page":"335","article-title":"Interorganisational workflows: an approach based on message sequence charts and Petri nets","volume":"34","author":"van der Aalst","year":"1999","journal-title":"Systems Analysis\u2013Modelling\u2013Simulation"},{"issue":"1","key":"10.1016\/j.ins.2008.11.025_bib3","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/S0378-7206(99)00038-5","article-title":"Loosely coupled interorganisational workflows: modeling and analyzing workflows crossing organizational boundaries","volume":"37","author":"van der Aalst","year":"2000","journal-title":"Information and Management"},{"issue":"1\u20132","key":"10.1016\/j.ins.2008.11.025_bib4","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/S0304-3975(00)00321-2","article-title":"Inheritance of workflows: an approach to tackling problems related to change","volume":"270","author":"van der Aalst","year":"2002","journal-title":"Theoretical Computer Science"},{"issue":"3","key":"10.1016\/j.ins.2008.11.025_bib5","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/TSMCC.2004.843181","article-title":"Model checking for E-business control and assurance","volume":"35","author":"Anderson","year":"2005","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics \u2013 Part C: Application and Reviews"},{"key":"10.1016\/j.ins.2008.11.025_bib6","doi-asserted-by":"crossref","first-page":"3143","DOI":"10.1016\/j.ins.2005.12.012","article-title":"Analyzing permutation capability of multistage interconnection networks with colored Petri nets","volume":"176","author":"Bashirov","year":"2006","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2008.11.025_bib7","unstructured":"D. Bolignano, Towards the formal verification of electronic commerce protocols, in: Proceedings of the 10th Computer Security Fundations Workshop, IEEE Computer Society Press, 1997, pp. 133\u2013146."},{"key":"10.1016\/j.ins.2008.11.025_bib8","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.datak.2005.03.008","article-title":"The view-based approach to dynamic inter-organizational workflow cooperation","volume":"56","author":"Chebbi","year":"2006","journal-title":"Data and Knowledge Engineering"},{"key":"10.1016\/j.ins.2008.11.025_bib9","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1016\/j.ins.2005.10.007","article-title":"Formalizing the specification and execution of workflows using the event calculus","volume":"176","author":"Cicekli","year":"2006","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2008.11.025_bib10","doi-asserted-by":"crossref","unstructured":"F. Crazzolara, G. Winskel, Language, semantics, and methods for cryptographic protocols, BRICS RS-00-18, Department of Computer Science, University of Aarhus, BRICS Report Series Publication, August 2000.","DOI":"10.7146\/brics.v7i18.20145"},{"key":"10.1016\/j.ins.2008.11.025_bib11","series-title":"Towards a Workflow Model of Real-Time Cooperative Systems","volume":"vol. 2885","author":"Du","year":"2003"},{"issue":"2","key":"10.1016\/j.ins.2008.11.025_bib12","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/BF02944798","article-title":"Verifying functions in online stock trading systems","volume":"19","author":"Du","year":"2004","journal-title":"Journal of Computer Science and Technology"},{"issue":"2","key":"10.1016\/j.ins.2008.11.025_bib13","first-page":"200","article-title":"A formal approach for obligation analysis of E-commerce","volume":"17","author":"Du","year":"2008","journal-title":"Chinese Journal of Electronics"},{"key":"10.1016\/j.ins.2008.11.025_bib14","unstructured":"Y.Y. Du, C.J. Jiang, M.C. Zhou, A Petri net-based model for verification of obligations and accountability in cooperative systems, IEEE Transactions on Systems, Man, and Cybernetics \u2013 Part A: Systems and Humans, 2009, in press."},{"issue":"2","key":"10.1016\/j.ins.2008.11.025_bib15","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/S1389-1286(01)00214-6","article-title":"Binding telecooperation \u2013 a formal model for electronic commerce","volume":"37","author":"Grimm","year":"2001","journal-title":"Computer Networks"},{"key":"10.1016\/j.ins.2008.11.025_bib16","series-title":"Modeling and Control of Discrete Event Dynamic Systems","author":"Hruz","year":"2007"},{"issue":"5","key":"10.1016\/j.ins.2008.11.025_bib17","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/32.502224","article-title":"Accountability in electronic commerce protocols","volume":"22","author":"Kailar","year":"1996","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.ins.2008.11.025_bib18","unstructured":"R.M. Lee, Automatic generation of electronic procedures: procedure constraint grammars, in: Proceedings of the Eleventh International Electronic Commerce Conference, Bled, Slovenia, June 1998, pp. II:49\u201385."},{"issue":"1","key":"10.1016\/j.ins.2008.11.025_bib19","first-page":"19","article-title":"Verification of nonblocking in decentralized supervision","volume":"7","author":"Lin","year":"1991","journal-title":"Control Theory and Advanced Technology"},{"key":"10.1016\/j.ins.2008.11.025_bib20","unstructured":"A. Pereira, M. Song, G. Gorgulho, W.M. Jr., S. Campos, A formal methodology to specify E-commerce systems, in: Lecture Notes in Computer Science LNCS, vol. 2495, Springer-Verlag, Berlin, Heidelberg, 2002, pp. 180\u2013191."},{"issue":"1","key":"10.1016\/j.ins.2008.11.025_bib21","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MRA.2004.1275947","article-title":"Mighty MESs: state-of-the-art and future manufacturing execution systems","volume":"11","author":"Qiu","year":"2004","journal-title":"IEEE Robotics and Automation Magazine"},{"issue":"6","key":"10.1016\/j.ins.2008.11.025_bib22","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TSMCB.2005.850141","article-title":"Modeling and deadlock avoidance of automated manufacturing systems with multiple automated guided vehicles","volume":"35","author":"Wu","year":"2005","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Part B"},{"issue":"3","key":"10.1016\/j.ins.2008.11.025_bib23","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/TASE.2006.888049","article-title":"Deadlock resolution in automated manufacturing systems with robots","volume":"4","author":"Wu","year":"2007","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"4","key":"10.1016\/j.ins.2008.11.025_bib24","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1109\/TASE.2008.916737","article-title":"A Petri net based heuristic algorithm for realizability of target refining schedules in oil refinery","volume":"5","author":"Wu","year":"2008","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"1","key":"10.1016\/j.ins.2008.11.025_bib25","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/TSMCA.2007.909542","article-title":"Resource-oriented Petri net for deadlock avoidance in flexible assembly systems","volume":"38","author":"Wu","year":"2008","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Part A"},{"issue":"4","key":"10.1016\/j.ins.2008.11.025_bib26","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/TSMCA.2008.923062","article-title":"QoS-aware Web service configuration","volume":"38","author":"Xiong","year":"2008","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Part A"},{"issue":"8","key":"10.1016\/j.ins.2008.11.025_bib27","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1002\/dac.840","article-title":"Ad hoc network routing and security: a review","volume":"20","author":"Zhang","year":"2007","journal-title":"International Journal of Communication Systems"},{"issue":"4","key":"10.1016\/j.ins.2008.11.025_bib28","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1109\/TSMCC.2006.875726","article-title":"Role-based collaboration and its kernel mechanisms","volume":"36","author":"Zhu","year":"2006","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part C"},{"issue":"6","key":"10.1016\/j.ins.2008.11.025_bib29","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1109\/TSMCA.2006.883170","article-title":"Supporting software development with role","volume":"36","author":"Zhu","year":"2006","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A"},{"issue":"3","key":"10.1016\/j.ins.2008.11.025_bib30","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/TSMCC.2008.919168","article-title":"Roles in information systems: a survey","volume":"38","author":"Zhu","year":"2008","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Part C"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025508004969?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025508004969?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T20:04:31Z","timestamp":1557950671000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025508004969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":30,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["S0020025508004969"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2008.11.025","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2009,3]]}}}