{"id":"https://openalex.org/W2019423992","doi":"https://doi.org/10.4304/jsw.6.7.1181-1187","title":"Modeling and Analysis of Electronic Commerce Protocols Using Colored Petri Nets","display_name":"Modeling and Analysis of Electronic Commerce Protocols Using Colored Petri Nets","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2019423992","doi":"https://doi.org/10.4304/jsw.6.7.1181-1187","mag":"2019423992"},"language":"en","primary_location":{"id":"doi:10.4304/jsw.6.7.1181-1187","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jsw.6.7.1181-1187","pdf_url":null,"source":{"id":"https://openalex.org/S114141714","display_name":"Journal of Software","issn_l":"1796-217X","issn":["1796-217X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101590508","display_name":"Xu Yang","orcid":"https://orcid.org/0000-0001-9714-0453"},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Xu","raw_affiliation_strings":["Guizhou Normal University"],"affiliations":[{"raw_affiliation_string":"Guizhou Normal University","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064057318","display_name":"Xiao Yao Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I154893126","display_name":"Guizhou Normal University","ror":"https://ror.org/02x1pa065","country_code":"CN","type":"education","lineage":["https://openalex.org/I154893126"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Yao Xie","raw_affiliation_strings":["Guizhou Normal University"],"affiliations":[{"raw_affiliation_string":"Guizhou Normal University","institution_ids":["https://openalex.org/I154893126"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014043696","display_name":"Huan Guo Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huan Guo Zhang","raw_affiliation_strings":["Wuhan Univ.,"],"affiliations":[{"raw_affiliation_string":"Wuhan Univ.,","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101590508"],"corresponding_institution_ids":["https://openalex.org/I154893126"],"apc_list":null,"apc_paid":null,"fwci":3.54426626,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.93501912,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"6","issue":"7","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9337664842605591},{"id":"https://openalex.org/keywords/petri-net","display_name":"Petri net","score":0.5905043482780457},{"id":"https://openalex.org/keywords/colored","display_name":"Colored","score":0.5289475917816162},{"id":"https://openalex.org/keywords/stochastic-petri-net","display_name":"Stochastic Petri net","score":0.41978174448013306},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3611654043197632}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9337664842605591},{"id":"https://openalex.org/C38677869","wikidata":"https://www.wikidata.org/wiki/Q724168","display_name":"Petri net","level":2,"score":0.5905043482780457},{"id":"https://openalex.org/C2778307483","wikidata":"https://www.wikidata.org/wiki/Q5149038","display_name":"Colored","level":2,"score":0.5289475917816162},{"id":"https://openalex.org/C197551870","wikidata":"https://www.wikidata.org/wiki/Q7617809","display_name":"Stochastic Petri net","level":3,"score":0.41978174448013306},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3611654043197632},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jsw.6.7.1181-1187","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jsw.6.7.1181-1187","pdf_url":null,"source":{"id":"https://openalex.org/S114141714","display_name":"Journal of Software","issn_l":"1796-217X","issn":["1796-217X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W148373023","https://openalex.org/W1534850333","https://openalex.org/W1850351066","https://openalex.org/W1976057180","https://openalex.org/W1991085086","https://openalex.org/W1997705191","https://openalex.org/W2004822040","https://openalex.org/W2065448760","https://openalex.org/W2151461610","https://openalex.org/W2157299411","https://openalex.org/W2168677351","https://openalex.org/W2352496691","https://openalex.org/W2352934940","https://openalex.org/W2362301033","https://openalex.org/W2362874332","https://openalex.org/W2517008931","https://openalex.org/W2891255201","https://openalex.org/W4241212268","https://openalex.org/W4353004773","https://openalex.org/W6638977638","https://openalex.org/W6648151198","https://openalex.org/W6682249331","https://openalex.org/W7001797791","https://openalex.org/W7067894875"],"related_works":["https://openalex.org/W2168615635","https://openalex.org/W2274714293","https://openalex.org/W2047356861","https://openalex.org/W16014793","https://openalex.org/W2016959625","https://openalex.org/W2884905799","https://openalex.org/W2101878283","https://openalex.org/W2168097987","https://openalex.org/W2354509792","https://openalex.org/W2133287278"],"abstract_inverted_index":{"Electronic":[0],"commerce":[1,51,85,141],"protocols":[2,18,29],"are":[3,128],"the":[4,21,27,75,90,97,103,115,118,132,135],"basis":[5],"of":[6,23,96,131,134],"security":[7,28],"in":[8,120],"electronic":[9,50,84,140],"commerce.":[10],"Therefore,":[11],"it":[12,65],"is":[13,46,56,78,87,100,114,125],"essential":[14],"to":[15,48,68,80],"ensure":[16],"these":[17],"correctly.":[19],"With":[20],"ideas":[22],"ZQ":[24,40,123],"logic":[25,41,124],"and":[26,42,62,110],"analysis":[30],"method":[31,38,55,137],"using":[32,89],"Colored":[33,43],"Petri":[34,44],"Nets,":[35],"a":[36,70],"new":[37,54,91,136],"synthesizing":[39],"Nets":[45],"presented":[47],"analyze":[49],"protocols.":[52,142],"The":[53,112],"suitable":[57],"for":[58,138],"analyzing":[59,139],"both":[60],"accountability":[61,109],"fairness.":[63,111],"However,":[64],"needs":[66],"not":[67,107],"establish":[69],"dispute":[71],"settlement":[72],"model.":[73],"Moreover,":[74],"ISI":[76,98,104],"protocol":[77,86,99,105],"chosen":[79],"illustrate":[81],"how":[82],"an":[83],"analyzed":[88],"method.":[92],"An":[93],"insecure":[94],"state":[95],"found.":[101],"Thus,":[102],"does":[106],"achieve":[108],"result":[113],"same":[116],"as":[117],"one":[119],"[10]":[121],"where":[122],"used.":[126],"These":[127],"stunning":[129],"confirmations":[130],"validity":[133]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
