{"id":"https://openalex.org/W2161849933","doi":"https://doi.org/10.1109/synasc.2010.74","title":"WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications","display_name":"WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications","publication_year":2010,"publication_date":"2010-09-01","ids":{"openalex":"https://openalex.org/W2161849933","doi":"https://doi.org/10.1109/synasc.2010.74","mag":"2161849933"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/synasc.2010.74","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038763902","display_name":"Michele Barletta","orcid":null},"institutions":[{"id":"https://openalex.org/I119439378","display_name":"University of Verona","ror":"https://ror.org/039bp8j42","country_code":"IT","type":"funder","lineage":["https://openalex.org/I119439378"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Michele Barletta","raw_affiliation_strings":["Dipartimento di Informatica Universit\u00e0 di Verona, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica Universit\u00e0 di Verona, Italy","institution_ids":["https://openalex.org/I119439378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110622154","display_name":"Alberto Calvi","orcid":null},"institutions":[{"id":"https://openalex.org/I119439378","display_name":"University of Verona","ror":"https://ror.org/039bp8j42","country_code":"IT","type":"funder","lineage":["https://openalex.org/I119439378"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alberto Calvi","raw_affiliation_strings":["Dipartimento di Informatica Universit\u00e0 di Verona, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica Universit\u00e0 di Verona, Italy","institution_ids":["https://openalex.org/I119439378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047487115","display_name":"Silvio Ranise","orcid":"https://orcid.org/0000-0001-7269-9285"},"institutions":[],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Silvio Ranise","raw_affiliation_strings":["FBK-Irst, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"FBK-Irst, Trento, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101515402","display_name":"Luca Vigan\u00f2","orcid":"https://orcid.org/0000-0001-9916-271X"},"institutions":[{"id":"https://openalex.org/I119439378","display_name":"University of Verona","ror":"https://ror.org/039bp8j42","country_code":"IT","type":"funder","lineage":["https://openalex.org/I119439378"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Vigano","raw_affiliation_strings":["Dipartimento di Informatica Universit\u00e0 di Verona, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica Universit\u00e0 di Verona, Italy","institution_ids":["https://openalex.org/I119439378"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074256360","display_name":"Luca Zanetti","orcid":null},"institutions":[],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Zanetti","raw_affiliation_strings":["FBK-Irst, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"FBK-Irst, Trento, Italy","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.227,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.641849,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":77},"biblio":{"volume":null,"issue":null,"first_page":"417","last_page":"424"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9946,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/satisfiability-modulo-theories","display_name":"Satisfiability Modulo Theories","score":0.61646193},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.4820479},{"id":"https://openalex.org/keywords/data-validation","display_name":"Data validation","score":0.4501238}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8031001},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6373198},{"id":"https://openalex.org/C164155591","wikidata":"https://www.wikidata.org/wiki/Q2067766","display_name":"Satisfiability modulo theories","level":2,"score":0.61646193},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.602574},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5740306},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.49955893},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.4820479},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.45591012},{"id":"https://openalex.org/C92446256","wikidata":"https://www.wikidata.org/wiki/Q3306762","display_name":"Data validation","level":2,"score":0.4501238},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4414249},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.43933058},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42257026},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.41739765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34011567},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3157537},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.261621},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/synasc.2010.74","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W120333500","https://openalex.org/W1540180001","https://openalex.org/W1591765658","https://openalex.org/W1596664612","https://openalex.org/W169672073","https://openalex.org/W1973291036","https://openalex.org/W1993883407","https://openalex.org/W2053912113","https://openalex.org/W2105505307","https://openalex.org/W2135995831","https://openalex.org/W2166602595","https://openalex.org/W2169348910","https://openalex.org/W3159832133","https://openalex.org/W4241509948","https://openalex.org/W647259934"],"related_works":["https://openalex.org/W4315606162","https://openalex.org/W4312733571","https://openalex.org/W2340807904","https://openalex.org/W2293855260","https://openalex.org/W2155162307","https://openalex.org/W2149716943","https://openalex.org/W2037121848","https://openalex.org/W2006962382","https://openalex.org/W1547517160","https://openalex.org/W1524612439"],"abstract_inverted_index":{"The":[0,15],"security":[1],"of":[2,20,23,37,47,53,74,88,93,127,131],"service-oriented":[3],"applications":[4,76],"is":[5,59,137,150],"crucial":[6],"in":[7,78],"several":[8],"contexts":[9],"such":[10,41],"as":[11,42],"e-commerce":[12],"or":[13],"e-governance.":[14],"design,":[16],"implementation,":[17],"and":[18,72,90,95,102],"deployment":[19],"this":[21,62],"kind":[22],"services":[24],"are":[25,110],"often":[26],"so":[27],"complex":[28],"that":[29],"serious":[30],"vulnerabilities":[31],"remain":[32],"even":[33],"after":[34],"extensive":[35],"application":[36],"traditional":[38],"validation":[39,58,73,126,156],"techniques,":[40],"testing.":[43],"Given":[44],"the":[45,51,70,81,86,91,96,125,146,151,177],"importance":[46],"security-sensitive":[48,75],"service":[49],"applications,":[50],"development":[52],"techniques":[54],"for":[55],"their":[56],"automated":[57],"growing.":[60],"In":[61,105],"paper,":[63],"we":[64],"illustrate":[65],"our":[66,106,154],"formal":[67],"framework":[68],"to":[69,112,139,144],"specification":[71],"structured":[77],"two":[79,171],"levels:":[80],"workflow":[82],"level":[83,98],"(dealing":[84],"with":[85],"control":[87],"flow":[89],"manipulation":[92],"data)":[94],"policy":[97],"(describing":[99],"trust":[100],"relationships":[101],"access":[103],"control).":[104],"framework,":[107],"verification":[108,147],"problems":[109,114],"reduced":[111],"logical":[113],"whose":[115],"decidability":[116],"can":[117],"be":[118],"shown":[119],"under":[120],"suitable":[121],"assumptions,":[122],"which":[123,165],"permit":[124],"practically":[128],"relevant":[129],"classes":[130],"services.":[132],"As":[133],"a":[134],"by-product,":[135],"it":[136],"possible":[138],"re-use":[140],"state-of-the-art":[141],"theorem-proving":[142],"technology":[143],"mechanize":[145],"process.":[148],"This":[149],"idea":[152],"underlying":[153],"prototype":[155],"tool":[157],"WSSMT,":[158],"\"Web-Service":[159],"(validation":[160],"by)":[161],"Satisfiability":[162],"Modulo":[163],"Theories'',":[164],"has":[166],"been":[167],"successfully":[168],"used":[169],"on":[170],"industrial":[172],"case":[173],"studies":[174],"taken":[175],"from":[176],"FP7":[178],"European":[179],"project":[180],"AVANTSSAR.":[181]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2161849933","counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-02-18T17:32:35.955619","created_date":"2016-06-24"}