{"id":"https://openalex.org/W3009529394","doi":"https://doi.org/10.1109/mis.2020.2977594","title":"Formal Analysis of Smart Contract Based on Colored Petri Nets","display_name":"Formal Analysis of Smart Contract Based on Colored Petri Nets","publication_year":2020,"publication_date":"2020-03-02","ids":{"openalex":"https://openalex.org/W3009529394","doi":"https://doi.org/10.1109/mis.2020.2977594","mag":"3009529394"},"language":"en","primary_location":{"id":"doi:10.1109/mis.2020.2977594","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mis.2020.2977594","pdf_url":null,"source":{"id":"https://openalex.org/S114241109","display_name":"IEEE Intelligent Systems","issn_l":"1541-1672","issn":["1541-1672","1941-1294"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101574780","display_name":"Duo Wang","orcid":"https://orcid.org/0000-0003-3092-3626"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wang Duo","raw_affiliation_strings":["Tongji University"],"affiliations":[{"raw_affiliation_string":"Tongji University","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101892149","display_name":"Xin Huang","orcid":"https://orcid.org/0000-0002-5909-5935"},"institutions":[{"id":"https://openalex.org/I69356397","display_name":"Xi\u2019an Jiaotong-Liverpool University","ror":"https://ror.org/03zmrmn05","country_code":"CN","type":"education","lineage":["https://openalex.org/I69356397"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huang Xin","raw_affiliation_strings":["Xi&#x0027;an Jiaotong-Liverpool University"],"affiliations":[{"raw_affiliation_string":"Xi&#x0027;an Jiaotong-Liverpool University","institution_ids":["https://openalex.org/I69356397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100606131","display_name":"Xiaofeng Ma","orcid":"https://orcid.org/0000-0002-6423-9198"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ma Xiaofeng","raw_affiliation_strings":["Tongji University"],"affiliations":[{"raw_affiliation_string":"Tongji University","institution_ids":["https://openalex.org/I116953780"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101574780"],"corresponding_institution_ids":["https://openalex.org/I116953780"],"apc_list":null,"apc_paid":null,"fwci":6.4057,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.96702734,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"35","issue":"3","first_page":"19","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8797680139541626},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7513562440872192},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.6461872458457947},{"id":"https://openalex.org/keywords/backtracking","display_name":"Backtracking","score":0.5805322527885437},{"id":"https://openalex.org/keywords/petri-net","display_name":"Petri net","score":0.5560024380683899},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.5453143119812012},{"id":"https://openalex.org/keywords/design-by-contract","display_name":"Design by contract","score":0.525272011756897},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.5108839869499207},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4662795066833496},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4555432200431824},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.4457884728908539},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.43960216641426086},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4282172918319702},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39730018377304077},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.37649038434028625},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.264782190322876},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.13021713495254517},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.12352249026298523},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.10585787892341614}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8797680139541626},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7513562440872192},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.6461872458457947},{"id":"https://openalex.org/C156884757","wikidata":"https://www.wikidata.org/wiki/Q798554","display_name":"Backtracking","level":2,"score":0.5805322527885437},{"id":"https://openalex.org/C38677869","wikidata":"https://www.wikidata.org/wiki/Q724168","display_name":"Petri net","level":2,"score":0.5560024380683899},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.5453143119812012},{"id":"https://openalex.org/C80291951","wikidata":"https://www.wikidata.org/wiki/Q1200691","display_name":"Design by contract","level":5,"score":0.525272011756897},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.5108839869499207},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4662795066833496},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4555432200431824},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.4457884728908539},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.43960216641426086},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4282172918319702},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39730018377304077},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.37649038434028625},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.264782190322876},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.13021713495254517},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.12352249026298523},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.10585787892341614},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.0},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mis.2020.2977594","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mis.2020.2977594","pdf_url":null,"source":{"id":"https://openalex.org/S114241109","display_name":"IEEE Intelligent Systems","issn_l":"1541-1672","issn":["1541-1672","1941-1294"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Intelligent Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1969344535","https://openalex.org/W2539190473","https://openalex.org/W2778144710","https://openalex.org/W2885034081","https://openalex.org/W2904939711","https://openalex.org/W2914735843","https://openalex.org/W2961680519","https://openalex.org/W2987907651","https://openalex.org/W4255703437"],"related_works":["https://openalex.org/W2096234982","https://openalex.org/W2296663577","https://openalex.org/W3043728819","https://openalex.org/W1606231633","https://openalex.org/W168005578","https://openalex.org/W2556057931","https://openalex.org/W2804791132","https://openalex.org/W4213079124","https://openalex.org/W3155016995","https://openalex.org/W3009529394"],"abstract_inverted_index":{"Smart":[0],"contracts":[1,17],"increasingly":[2],"cause":[3],"attention":[4],"for":[5,47],"its":[6,21],"ability":[7],"to":[8,20,35,54],"widen":[9],"blockchain's":[10],"application":[11],"scope.":[12],"However,":[13],"the":[14,37,43,51,68,73,77,85,88,97,102,116,119,144,149],"security":[15,38,86],"of":[16,39,87,118,148,152],"is":[18,105],"vital":[19],"wide":[22],"deployment.":[23],"In":[24,121],"this":[25],"article,":[26],"we":[27,123],"propose":[28],"a":[29,56,125,135],"multilevel":[30],"smart":[31],"contract":[32,89,103],"modeling":[33,128],"solution":[34],"analyze":[36,84],"contract.":[40],"We":[41],"improve":[42],"program":[44],"logic":[45],"rules":[46],"bytecode":[48],"and":[49,76,134,146],"apply":[50],"Hoare":[52],"condition":[53],"create":[55],"Colored":[57],"Petri":[58],"Net":[59],"(CPN)":[60],"model.":[61],"The":[62,93],"model":[63,104],"detection":[64],"method":[65],"provided":[66],"by":[67,101],"CPN":[69,153],"tools":[70],"can":[71],"show":[72],"full-state":[74],"space":[75],"wrong":[78],"execution":[79],"path,":[80],"which":[81,142],"help":[82],"us":[83],"from":[90],"several":[91],"perspectives.":[92],"example":[94],"shows":[95],"that":[96],"counter-example":[98],"path":[99,136],"given":[100],"accord":[106],"with":[107],"our":[108],"expected":[109],"results":[110],"based":[111,139],"on":[112,140],"code":[113],"analysis,":[114],"proving":[115],"correctness":[117],"solution.":[120],"addition,":[122],"design":[124],"highly":[126],"automated":[127],"method,":[129],"introducing":[130],"custom":[131],"call":[132],"libraries":[133],"derivation":[137],"algorithm":[138],"backtracking,":[141],"improves":[143],"efficiency":[145],"pertinence":[147],"dynamic":[150],"simulation":[151],"models.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
