{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T08:33:11Z","timestamp":1721809991150},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T00:00:00Z","timestamp":1762473600000},"content-version":"am","delay-in-days":676,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Science of Computer Programming"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1016\/j.scico.2023.103048","type":"journal-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T04:17:32Z","timestamp":1697861852000},"page":"103048","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["A formal approach for the correct deployment of cloud applications"],"prefix":"10.1016","volume":"232","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0016-6898","authenticated-orcid":false,"given":"Amel","family":"Mammar","sequence":"first","affiliation":[]},{"given":"Meriem","family":"Belguidoum","sequence":"additional","affiliation":[]},{"given":"Saddam Hocine","family":"Hiba","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.scico.2023.103048_br0010","series-title":"On the Move to Meaningful Internet Systems","first-page":"732","article-title":"A formal approach for correct elastic package-based free and open source software composition in cloud","author":"Abbassi","year":"2017"},{"key":"10.1016\/j.scico.2023.103048_br0020","series-title":"The B-Book: Assigning Programs to Meanings","author":"Abrial","year":"1996"},{"key":"10.1016\/j.scico.2023.103048_br0030","series-title":"Modeling in Event-B - System and Software Engineering","author":"Abrial","year":"2010"},{"issue":"6","key":"10.1016\/j.scico.2023.103048_br0040","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/s10009-010-0145-y","article-title":"Rodin: an open toolset for modelling and reasoning in Event-B","volume":"12","author":"Abrial","year":"2010","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"10.1016\/j.scico.2023.103048_br0050","first-page":"447","article-title":"Elasticity in cloud computing: state of the art and research challenges","volume":"430","author":"Al-Dhuraibi","year":"2018","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"10.1016\/j.scico.2023.103048_br0060","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/s11219-007-9019-2","article-title":"Deployment and dynamic reconfiguration planning for distributed software systems","volume":"15","author":"Arshad","year":"2007","journal-title":"Softw. Qual. J."},{"key":"10.1016\/j.scico.2023.103048_br0070","series-title":"Conception d'une infrastructure pour un d\u00e9ploiement s\u00fbr et flexible des composants logiciels","author":"Belguidoum","year":"2008"},{"key":"10.1016\/j.scico.2023.103048_br0080","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.entcs.2006.09.029","article-title":"Dependency management in software component deployment","volume":"182","author":"Belguidoum","year":"2007","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"4","key":"10.1016\/j.scico.2023.103048_br0090","doi-asserted-by":"crossref","first-page":"2977","DOI":"10.1007\/s10586-021-03305-4","article-title":"A model-based approach for formal verification and performance analysis of dynamic load-balancing protocols in cloud environment","volume":"24","author":"Ben Hafaiedh","year":"2021","journal-title":"Clust. Comput."},{"key":"10.1016\/j.scico.2023.103048_br0100","series-title":"A Formal Approach to Microservice Architecture Deployment","first-page":"183","author":"Bravetti","year":"2020"},{"key":"10.1016\/j.scico.2023.103048_br0110","series-title":"Reference Manual of the LOTOS NT to LOTOS Translator \u2013 Version 5.4","author":"Champelovier","year":"2011"},{"key":"10.1016\/j.scico.2023.103048_br0120","series-title":"5th International Symposium on Formal Approaches to Parallel and Distributed Systems (Hosted at HPCS 2018)","first-page":"1","article-title":"Madeus: a formal deployment model","author":"Chardet","year":"2018"},{"issue":"1","key":"10.1016\/j.scico.2023.103048_br0130","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/spe.2400","article-title":"Reliable self-deployment of distributed cloud applications","volume":"47","author":"Etchevers","year":"2017","journal-title":"Softw. Pract. Exp."},{"issue":"4","key":"10.1016\/j.scico.2023.103048_br0140","doi-asserted-by":"crossref","first-page":"341","DOI":"10.3897\/jucs.66455","article-title":"Formal verification of cloud and fog systems: a review and research challenges","volume":"27","author":"Fakhfakh","year":"2021","journal-title":"J. Univers. Comput. Sci."},{"key":"10.1016\/j.scico.2023.103048_br0150","series-title":"Above the clouds: a Berkeley view of cloud computing","author":"Fox","year":"2009"},{"key":"10.1016\/j.scico.2023.103048_br0160","series-title":"Utility and Cloud Computing (UCC), 2012 IEEE Fifth International Conference on","first-page":"263","article-title":"A survey on cloud computing elasticity","author":"Galante","year":"2012"},{"key":"10.1016\/j.scico.2023.103048_br0170","series-title":"CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes, vol. 6605","first-page":"372","author":"Garavel","year":"2011"},{"issue":"6","key":"10.1016\/j.scico.2023.103048_br0180","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1007\/s00165-017-0425-3","article-title":"A verification and deployment approach for elastic component-based applications","volume":"29","author":"Graiet","year":"2017","journal-title":"Form. Asp. Comput."},{"key":"10.1016\/j.scico.2023.103048_br0190","first-page":"23","article-title":"Elasticity in cloud computing: what it is, and what it is not","volume":"vol. 13","author":"Herbst","year":"2013"},{"key":"10.1016\/j.scico.2023.103048_br0200","series-title":"2012 International Conference on Collaboration Technologies and Systems (CTS)","first-page":"447","article-title":"Cloud calculus: security verification in elastic cloud computing platform","author":"Jarraya","year":"2012"},{"key":"10.1016\/j.scico.2023.103048_br0210","series-title":"Formal Methods for Components and Objects","first-page":"142","article-title":"Abs: a core language for abstract behavioral specification","author":"Johnsen","year":"2012"},{"key":"10.1016\/j.scico.2023.103048_br0220","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2020.103483","article-title":"SLA-driven modeling and verifying cloud systems: a bigraphical reactive systems-based approach","volume":"74","author":"Kamel","year":"2021","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.scico.2023.103048_br0230","series-title":"2012 Sixth UKSim\/AMSS European Symposium on Computer Modeling and Simulation","first-page":"67","article-title":"Security support for intention driven elastic cloud computing","author":"Karam","year":"2012"},{"key":"10.1016\/j.scico.2023.103048_br0240","series-title":"New Trends in Model and Data Engineering","first-page":"64","article-title":"Formal modeling and verification of cloud elasticity with Maude and ltl","author":"Khebbeb","year":"2019"},{"key":"10.1016\/j.scico.2023.103048_br0250","author":"Leuschel"},{"key":"10.1016\/j.scico.2023.103048_br0260","series-title":"FME 2003: Formal Methods","first-page":"855","article-title":"ProB: a model checker for B","author":"Leuschel","year":"2003"},{"key":"10.1016\/j.scico.2023.103048_br0270","first-page":"1","article-title":"Achieving one-round password-based authenticated key exchange over lattices","author":"Li","year":"2019","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.scico.2023.103048_br0280","author":"Mammar"},{"key":"10.1016\/j.scico.2023.103048_br0290","series-title":"The NIST Definition of Cloud Computing","author":"Mell","year":"2011"},{"key":"10.1016\/j.scico.2023.103048_br0300","series-title":"TACAS","first-page":"337","article-title":"Z3: an efficient SMT solver","volume":"vol. 4963","author":"de Moura","year":"2008"},{"issue":"13","key":"10.1016\/j.scico.2023.103048_br0310","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1016\/j.ifacol.2019.11.361","article-title":"Formal methods based security for cloud-based manufacturing cyber physical system","volume":"52","author":"Muniasamy","year":"2019","journal-title":"IFAC-PapersOnLine"},{"issue":"5","key":"10.1016\/j.scico.2023.103048_br0320","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCC.2016.108","article-title":"Online analysis of security risks in elastic cloud applications","volume":"3","author":"Naskos","year":"2016","journal-title":"IEEE Cloud Comput."},{"key":"10.1016\/j.scico.2023.103048_br0330","series-title":"2018 Sixth International Conference on Advanced Cloud and Big Data (CBD)","first-page":"42","article-title":"Using PVS for modeling and verifying cloud services and their composition","author":"Nawaz","year":"2018"},{"key":"10.1016\/j.scico.2023.103048_br0340","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TDSC.2020.3022797","article-title":"Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices","author":"Qiu","year":"2020","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"10.1016\/j.scico.2023.103048_br0350","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10009-015-0381-2","article-title":"Code generation for Event-B","volume":"19","author":"Rivera","year":"2017","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"issue":"1","key":"10.1016\/j.scico.2023.103048_br0360","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1109\/TII.2018.2824815","article-title":"Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications","volume":"15","author":"Roy","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.scico.2023.103048_br0370","first-page":"1","article-title":"Vertical and horizontal elasticity for dynamic virtual machine reconfiguration","volume":"PP","author":"Sotiriadis","year":"2016","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.scico.2023.103048_br0380","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.csi.2017.11.007","article-title":"Formal verification approaches and standards in the cloud computing: a comprehensive and systematic review","volume":"58","author":"Souri","year":"2018","journal-title":"Comput. Stand. Interfaces"},{"issue":"5","key":"10.1016\/j.scico.2023.103048_br0390","doi-asserted-by":"crossref","first-page":"2208","DOI":"10.1007\/s13198-022-01627-z","article-title":"Verification of cloud system elasticity using bigmc","volume":"13","author":"Yadav","year":"2022","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"10.1016\/j.scico.2023.103048_br0400","series-title":"2012 IEEE Global Communications Conference (GLOBECOM)","first-page":"777","article-title":"Verifying cloud service level agreement","author":"Ye","year":"2012"},{"key":"10.1016\/j.scico.2023.103048_br0410","series-title":"Services 2019","first-page":"1","article-title":"SMT-based modeling and verification of cloud applications","author":"Zhang","year":"2019"}],"container-title":["Science of Computer Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642323001302?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642323001302?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T18:43:37Z","timestamp":1718736217000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167642323001302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":41,"alternative-id":["S0167642323001302"],"URL":"https:\/\/doi.org\/10.1016\/j.scico.2023.103048","relation":{},"ISSN":["0167-6423"],"issn-type":[{"value":"0167-6423","type":"print"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A formal approach for the correct deployment of cloud applications","name":"articletitle","label":"Article Title"},{"value":"Science of Computer Programming","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.scico.2023.103048","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103048"}}