{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:32:35Z","timestamp":1725550355150},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540297369"},{"type":"electronic","value":"9783540321163"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11575771_7","type":"book-chapter","created":{"date-parts":[[2005,10,10]],"date-time":"2005-10-10T19:07:11Z","timestamp":1128971231000},"page":"59-76","source":"Crossref","is-referenced-by-count":37,"title":["Balancing Flexibility and Security in Adaptive Process Management Systems"],"prefix":"10.1007","author":[{"given":"Barbara","family":"Weber","sequence":"first","affiliation":[]},{"given":"Manfred","family":"Reichert","sequence":"additional","affiliation":[]},{"given":"Werner","family":"Wild","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Rinderle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","first-page":"93","volume":"10","author":"M. Reichert","year":"1998","unstructured":"Reichert, M., Dadam, P.: ADEPT flex - supporting dynamic changes of workflows without losing control. JIIS\u00a010, 93\u2013129 (1998)","journal-title":"JIIS"},{"key":"7_CR2","unstructured":"J\u00f8rgensen, H.D.: Interactive Process Models. PhD thesis, Norwegian University of Science and Technology, Trondheim, Norway (2004)"},{"key":"7_CR3","first-page":"9","volume":"50","author":"S. Rinderle","year":"2004","unstructured":"Rinderle, S., Reichert, M., Dadam, P.: Correctness criteria for dynamic changes in workflow systems \u2013 a survey. Data and Knowledge Engineering, Special Issue on Advances in Business Process Management\u00a050, 9\u201334 (2004)","journal-title":"Data and Knowledge Engineering, Special Issue on Advances in Business Process Management"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0169-023X(97)00033-5","volume":"24","author":"F. Casati","year":"1998","unstructured":"Casati, F., Ceri, S., Pernici, B., Pozzi, G.: Workflow evolution. Data and Knowledge Engineering\u00a024, 211\u2013238 (1998)","journal-title":"Data and Knowledge Engineering"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/S0304-3975(00)00321-2","volume":"270","author":"W.M.P. Aalst v.d.","year":"2002","unstructured":"v.d. Aalst, W.M.P., Basten, T.: Inheritance of workflows: An approach to tackling problems related to change. Theoret. Comp. Science\u00a0270, 125\u2013203 (2002)","journal-title":"Theoret. Comp. Science"},{"key":"7_CR6","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1145\/201040.201049","volume":"13","author":"D. Strong","year":"1995","unstructured":"Strong, D., Miller, S.: Exceptions and exception handling in computerized information processes. ACM\u2013TOIS\u00a013, 206\u2013233 (1995)","journal-title":"ACM\u2013TOIS"},{"key":"7_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/978-3-540-28631-8_32","volume-title":"Advances in Case-Based Reasoning","author":"B. Weber","year":"2004","unstructured":"Weber, B., Wild, W., Breu, R.: CBRFlow: Enabling adaptive workflow management through conversational case-based reasoning. In: Funk, P., Gonz\u00e1lez Calero, P.A. (eds.) ECCBR 2004. LNCS (LNAI), vol.\u00a03155, pp. 434\u2013448. Springer, Heidelberg (2004)"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008388412284","volume":"13","author":"Z. Luo","year":"2000","unstructured":"Luo, Z., Sheth, A., Kochut, K., Miller, J.: Exception handling in workflow systems. Applied Intelligence\u00a013, 125\u2013147 (2000)","journal-title":"Applied Intelligence"},{"key":"7_CR9","unstructured":"Weske, M.: Workflow management systems: Formal foundation, conceptual design, implementation aspects. University of M\u00fcnster, Germany, Habil Thesis (2000)"},{"key":"7_CR10","first-page":"455","volume":"12","author":"J. Wainer","year":"2003","unstructured":"Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - a workflow security model incorporating controlled overriding of constraints. IJCIS\u00a012, 455\u2013485 (2003)","journal-title":"IJCIS"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Alturi, V.: The specification and enforcement of authorization constraints in wfms. ACM Trans. on Inf. and Sys. Sec.\u00a02, 65\u2013104 (1999)","journal-title":"ACM Trans. on Inf. and Sys. Sec."},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1108\/09685220110394848","volume":"9","author":"R. Botha","year":"2001","unstructured":"Botha, R., Eloff, J.: A framework for access control in workflow systems. Information Management and Computer Security\u00a09, 126\u2013133 (2001)","journal-title":"Information Management and Computer Security"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1023\/A:1011461409620","volume":"3","author":"F. Casati","year":"2001","unstructured":"Casati, F., Castano, S., Fugini, M.: Managing workflow authorization constraints through active database technology. Inf. Sys. Frontiers\u00a03, 319\u2013338 (2001)","journal-title":"Inf. Sys. Frontiers"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/S0164-1212(03)00175-4","volume":"73","author":"D.-R. Liu","year":"2004","unstructured":"Liu, D.-R., Wu, M.-Y., Lee, S.-T.: Role-based authorization for workflow systems in support of task-based separation of duty. The Journal of Systems and Software\u00a073, 375\u2013387 (2004)","journal-title":"The Journal of Systems and Software"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.datak.2004.07.003","volume":"53","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., Weske, M., Gr\u00fcnbauer, D.: Case handling: A new paradigm for business process support. Data and Knowledge Engineering\u00a053, 129\u2013162 (2005)","journal-title":"Data and Knowledge Engineering"},{"key":"7_CR16","doi-asserted-by":"crossref","first-page":"303","DOI":"10.3233\/JCS-1997-5403","volume":"5","author":"V. Atluri","year":"1997","unstructured":"Atluri, V., Huang, W.K.: Enforcing mandatory and discretionary security in workflow management systems. Journal of Computer Security\u00a05, 303\u2013339 (1997)","journal-title":"Journal of Computer Security"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-540-39650-5_2","volume-title":"Computer Security \u2013 ESORICS 2003","author":"D. Domingos","year":"2003","unstructured":"Domingos, D., Rito-Silva, A., Veiga, P.: Authorization and access control in adaptive workflows. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 23\u201338. Springer, Heidelberg (2003)"},{"key":"7_CR18","unstructured":"Rinderle, S.: Schema Evolution in Process Management Systems. PhD thesis, University of Ulm (2004)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/11538394_17","volume-title":"Business Process Management","author":"S. Rinderle","year":"2005","unstructured":"Rinderle, S., Weber, B., Reichert, M., Wild, W.: Integrating process learning and process evolution - a semantics based approach. In: van der Aalst, W.M.P., Benatallah, B., Casati, F., Curbera, F. (eds.) BPM 2005. LNCS, vol.\u00a03649, pp. 252\u2013267. Springer, Heidelberg (2005)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Weber, B., Reichert, M., Rinderle, S., Wild, W.: Towards a framework for the agile mining of business processes. In: Proc. of Int\u2019l BPI workshop (2005)","DOI":"10.1007\/11678564_17"},{"key":"7_CR21","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1007\/11536406_46","volume-title":"Case-Based Reasoning Research and Development","author":"B. Weber","year":"2005","unstructured":"Weber, B., Rinderle, S., Wild, W., Reichert, M.: CCBR\u2013driven business process evolution. In: Mu\u00f1oz-\u00c1vila, H., Ricci, F. (eds.) ICCBR 2005. LNCS (LNAI), vol.\u00a03620, pp. 610\u2013624. Springer, Heidelberg (2005)"},{"key":"7_CR22","unstructured":"Reichert, M.: Dynamic Changes in Workflow-Management-Systems. PhD thesis, University of Ulm, Computer Science Faculty (2000) (in German)"},{"key":"7_CR23","unstructured":"Konyen, I.: Organizational structures and business processes in hospitals. Master\u2019s thesis, University of Ulm, Computer Science Faculty (1996) (in German)"},{"key":"7_CR24","unstructured":"Ferraiolo, D.F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference (1992)"},{"key":"7_CR25","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"7_CR26","unstructured":"Ferraiolo, D.F., Chandramouli, R., Kuhn, D.R.: Role-Based Access Control. Artech House, Incorporated (2003)"},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/3-540-45581-7_38","volume-title":"Conceptual Modeling - ER 2001","author":"S. Sadiq","year":"2001","unstructured":"Sadiq, S., Sadiq, W., Orlowska, M.: Pockets of flexibility in workflow specifications. In: Kunii, H.S., Jajodia, S., S\u00f8lvberg, A. (eds.) ER 2001. LNCS, vol.\u00a02224, pp. 513\u2013526. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11575771_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:57:49Z","timestamp":1605643069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11575771_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540297369","9783540321163"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11575771_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}