{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T02:59:53Z","timestamp":1648954793459},"reference-count":20,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.6.1417-1424","type":"journal-article","created":{"date-parts":[[2013,6,17]],"date-time":"2013-06-17T12:04:37Z","timestamp":1371470677000},"source":"Crossref","is-referenced-by-count":0,"title":["Formal Behavior Modeling: Business Processes Based on Cloud Platform"],"prefix":"10.4304","volume":"8","author":[{"given":"Bo","family":"Huang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Mengting","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Guoqing","family":"Wu","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,6,15]]},"reference":[{"key":"ref1","first-page":"379","article-title":"Realizing business agility requirements through SOA and cloud computing","volume-title":"Proceedings of the 2010 18th IEEE International Requirements Engineering Conference","author":"Mamoun","year":"2010","unstructured":"[1] H. Mamoun, \"Realizing business agility requirements through SOA and cloud computing,\" In Proceedings of the 2010 18th IEEE International Requirements Engineering Conference, pp. 379-380, 2010."},{"key":"ref2","first-page":"369","article-title":"Cloud computing architecture based-on SOA","volume-title":"Proceedings of the 2012 5th International Symposium on Computational Intelligence and Design","author":"Huimin","year":"2012","unstructured":"[3] Z. Huimin and Y. Xiaolong,\"Cloud computing architecture based-on SOA,\"In Proceedings of the 2012 5th International Symposium on Computational Intelligence and Design, pp.369-373, 2012."},{"key":"ref3","first-page":"369","article-title":"R, S. George. O and Y. Stephen. S, \"Challenges towards the global adoption of cloud computing","volume-title":"Proceedings of the International Computer Software and Applications Conference","author":"Vladimir","year":"2012","unstructured":"[4] G. Vladimir, C. William, C. William. R, S. George. O and Y. Stephen. S, \"Challenges towards the global adoption of cloud computing,\" In Proceedings of the International Computer Software and Applications Conference, pp.369-372, 2012."},{"issue":"no. 4","key":"ref4","first-page":"69","article-title":"Asma, H. Amel, J. Maha and T. Sami, \"State of the art and research challenges of new services architecture technologies: Virtualization, SOA and cloud computing","volume":"3","author":"Letaifa","year":"2010","unstructured":"[6] B. Letaifa. Asma, H. Amel, J. Maha and T. Sami, \"State of the art and research challenges of new services architecture technologies: Virtualization, SOA and cloud computing,\" International Journal of Grid and Distributed Computing, vol. 3, no. 4, pp. 69-88, 2010.","journal-title":"International Journal of Grid and Distributed Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735234"},{"issue":"no. 3","key":"ref6","first-page":"59","article-title":"\"Access control security model based on behavior in cloud computing environment,\" Tongxin Xuebao","volume":"33","author":"Guoyuan","year":"2012","unstructured":"[12] L. Guoyuan, H. Shan, H. Hao, W. Jiyi and C. Wei, \"Access control security model based on behavior in cloud computing environment,\" Tongxin Xuebao\/Journal on Communications, vol. 33, no. 3, pp. 59-66, March 2012.","journal-title":"J Commun","ISSN":"http:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"issue":"no. 6","key":"ref7","first-page":"3157","article-title":"The model design of print on demand business process facing the cloud","volume":"7","author":"Jia","year":"2012","unstructured":"[14] Z. Jia and L. Yeli, \"The model design of print on demand business process facing the cloud,\" International Review on Computers and Software,vol. 7, no. 6, pp. 3157-3161, November 2012.","journal-title":"International Review on Computers and Software"},{"key":"ref8","volume-title":"Come Let s play Scenario-Based Programming Using LSCs and the Play-Engine Springer-Verlag","author":"Harel","year":"2003","unstructured":"[16] D. Harel and R. Marelly, Come, Let's play: Scenario-Based Programming Using LSCs and the Play-Engine, Springer-Verlag, 2003, GER."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03718-4_139"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.5.6.622-628"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-011-0789-9"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"[2] L. Shuang, \"The design and realization of cloud computing framework model based on SOA,\" Advanced Materials Research, vol(171-172), 2011, pp. 696-701, 2011.","DOI":"10.1007\/s11859-011-0789-9"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"[5] W. Lingyan and L. Aimin, \"The study on cloud computing resource allocation method,\" Applied Mechanics and Materials, vol(198-199), pp.1506-1513, 2012.","DOI":"10.1007\/s11859-011-0789-9"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"[7] L. Yinsheng, L. Jiao, Z. Feng, F. Yong and C. Hao, \"Cloudexplorer: A user-centered cloud browser for cloud services,\" In Proceedings of the 9th IEEE International Conference on E-Business Engineering, ICEBE 2012, pp. 214-220, 2012.","DOI":"10.1007\/s11859-011-0789-9"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"[8] S. Ghemawat, H. Gobioff and ST. Leung, \"The Google file system,\" ACM SIGOPS Operating Systems Review, vol. 37, no. 5, pp. 29-43, ACM.2003.","DOI":"10.1007\/s11859-011-0789-9"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"[9] G. Boss, P. Malladi, D. Quan, L. Legregni and H. Hall, \"Cloud computing. IBM White Paper, 2007\". 2009-9-18. http:\/\/download.boulder.ibm.com\/ibmdl\/pub\/software\/dw\/wes\/hipods\/Cloud_computing_wp_final_8Oct.pdf.","DOI":"10.1007\/s11859-011-0789-9"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"[11] S. Yi, D. Kondo and A. Andrzejak, \"Reducing costs of spot instances via checkpointing in the amazon elastic compute cloud,\" Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on IEEE, pp.236-243, 2010.","DOI":"10.1007\/s11859-011-0789-9"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"[13] J. Damasceno, F. Lins, R. Medeiros, B. Silva, A. Souza, D. Arag\u00e3o, P. Maciel, N. Rosa, B. Stephenson and J. Li, \"Modeling and executing business processes with annotated security requirements in the cloud,\" In Proceedings of the 2011 IEEE 9th International Conference on Web Services, ICWS 2011, pp. 137-144, 2011.","DOI":"10.1007\/s11859-011-0789-9"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"[15] A. Tobias, L. Frank, M. Ralph and S. Steve, \"Towards BPEL in the cloud: Exploiting different delivery models for the execution of business processes,\" In Proceedings of the 2009 IEEE Congress on Services, SERVICES 2009, pp. 670-677, 2009.","DOI":"10.1007\/s11859-011-0789-9"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"[17] F. Moller and Chris Tofts. A temporal calculus of communicating systems. Springer Berlin Heidelberg, 1990.","DOI":"10.1007\/s11859-011-0789-9"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T10:46:49Z","timestamp":1498042009000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jnw\/article\/view\/10232"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,15]]},"references-count":20,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2013,6,15]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.6.1417-1424","relation":{},"ISSN":["1796-2056"],"issn-type":[{"value":"1796-2056","type":"print"}],"subject":[],"published":{"date-parts":[[2013,6,15]]}}}