{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T14:53:07Z","timestamp":1760799187474},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540384441"},{"type":"electronic","value":"9783540384458"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11837862_2","type":"book-chapter","created":{"date-parts":[[2006,9,19]],"date-time":"2006-09-19T10:22:52Z","timestamp":1158661372000},"page":"5-14","source":"Crossref","is-referenced-by-count":135,"title":["Designing Compliant Business Processes with Obligations and Permissions"],"prefix":"10.1007","author":[{"given":"Stijn","family":"Goedertier","sequence":"first","affiliation":[]},{"given":"Jan","family":"Vanthienen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Goedertier, S., Vanthienen, J.: Compliant and Flexible Business Processes with Business Rules. In: Proceedings, CAiSE 2006, Workshop BPMDS 2006 (forthcoming 2006)"},{"issue":"3","key":"2_CR2","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1142\/S0218843003000784","volume":"12","author":"H.A. Reijers","year":"2003","unstructured":"Reijers, H.A., Rigter, J.H.M., van der Aalst, W.M.P.: The case handling case. Int. J. Cooperative Inf. Syst.\u00a012(3), 365\u2013391 (2003)","journal-title":"Int. J. Cooperative Inf. Syst."},{"key":"2_CR3","first-page":"189","volume":"3","author":"R.W.H. Bons","year":"1995","unstructured":"Bons, R.W.H., Lee, R.M., Wagenaar, R.W., Wrigley, C.D.: Modelling inter-organizational trade using documentary petri nets. HICSS\u00a0(3), 189\u2013198 (1995)","journal-title":"HICSS"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/3-540-44809-8_2","volume-title":"Technologies for E-Services","author":"C. Bussler","year":"2001","unstructured":"Bussler, C.: The role of B2B protocols in inter-enterprise process execution. In: Casati, F., Georgakopoulos, D., Shan, M.-C. (eds.) TES 2001. LNCS, vol.\u00a02193, pp. 16\u201329. Springer, Heidelberg (2001)"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/323706.323719","volume-title":"ICAIL 1999: Proceedings of the 7th international conference on Artificial intelligence and law","author":"R.H. Mar\u00edn","year":"1999","unstructured":"Mar\u00edn, R.H., Sartor, G.: Time and norms: a formalisation in the event-calculus. In: ICAIL 1999: Proceedings of the 7th international conference on Artificial intelligence and law, pp. 90\u201399. ACM Press, New York (1999)"},{"issue":"1-3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1023\/B:AMAI.0000034528.55456.d9","volume":"42","author":"P. Yolum","year":"2004","unstructured":"Yolum, P., Singh, M.P.: Reasoning about commitments in the event calculus: An approach for specifying and executing protocols. Annals of Mathematics and Artificial Intelligence\u00a042(1-3), 227\u2013253 (2004)","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"2_CR7","unstructured":"Knottenbelt, J., Clark, K.: An architecture for contract-based communicating agents. In: Proceedings of the 2nd Europ. Workshop on Multi-Agent Sys. (2004)"},{"issue":"2-3","key":"2_CR8","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1142\/S0218843005001092","volume":"14","author":"G. Governatori","year":"2005","unstructured":"Governatori, G.: Representing business contracts in uleml. Int. J. Cooperative Inf. Syst.\u00a014(2-3), 181\u2013216 (2005)","journal-title":"Int. J. Cooperative Inf. Syst."},{"issue":"2","key":"2_CR9","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"W.M.P. Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow mining: A survey of issues and approaches. Data Knowl. Eng.\u00a047(2), 237\u2013267 (2003)","journal-title":"Data Knowl. Eng."},{"key":"2_CR10","first-page":"1","volume-title":"Deontic Logic: Introductory and Systematic Readings","author":"D. F\u00f8llesdal","year":"1971","unstructured":"F\u00f8llesdal, D., Hilpinen, R.: Deontic logic: An introduction. In: Hilpinen, R. (ed.) Deontic Logic: Introductory and Systematic Readings, pp. 1\u201335. D. Reidel Publishing Company, Dordrecht (1971)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-58043-3_19","volume-title":"A Decade of Concurrency","author":"E.M. Clarke","year":"1994","unstructured":"Clarke, E.M., Grumberg, O., Long, D.E.: Verification tools for finite-state concurrent systems. In: de Bakker, J.W., de Roever, W.-P., Rozenberg, G. (eds.) REX 1993. LNCS, vol.\u00a0803, pp. 124\u2013175. Springer, Heidelberg (1994)"},{"key":"2_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-540-25927-5_5","volume-title":"Deontic Logic in Computer Science","author":"J. Broersen","year":"2004","unstructured":"Broersen, J., Dignum, F., Dignum, V., Meyer, J.J.C.: Designing a deontic logic of deadlines. In: Lomuscio, A., Nute, D. (eds.) DEON 2004. LNCS (LNAI), vol.\u00a03065, pp. 43\u201356. Springer, Heidelberg (2004)"},{"key":"2_CR13","volume-title":"Solving the frame problem: a mathematical investigation of the common sense law of inertia","author":"M. Shanahan","year":"1997","unstructured":"Shanahan, M.: Solving the frame problem: a mathematical investigation of the common sense law of inertia. MIT Press, Cambridge (1997)"},{"key":"2_CR14","unstructured":"Goedertier, S., Vanthienen, J.: Business Rules for Compliant Business Process Models. In: Proceeding of the 9th International Conference on Business Information Systems (BIS 2006). LNI., GI, vol.\u00a0P-85 (2006)"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/1082473.1082489","volume-title":"AAMAS 2005","author":"P. Yolum","year":"2005","unstructured":"Yolum, P.: Towards design tools for protocol development. In: AAMAS 2005, pp. 99\u2013105. ACM Press, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11837862_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:14:50Z","timestamp":1619507690000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11837862_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540384441","9783540384458"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11837862_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}