{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:44:19Z","timestamp":1725497059223},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540001065"},{"type":"electronic","value":"9783540361244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36124-3_21","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T17:37:10Z","timestamp":1196703430000},"page":"356-372","source":"Crossref","is-referenced-by-count":1,"title":["Regulating Work in Digital Enterprises: A Flexible Managerial Framework"],"prefix":"10.1007","author":[{"given":"Takahiro","family":"Murata","sequence":"first","affiliation":[]},{"given":"Naftaly H.","family":"Minsky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,11,5]]},"reference":[{"key":"21_CR1","unstructured":"X. Ao, Minsky N. H., and T. Nguyen. A hierarchical policy specification language, and enforcement mechanism, for governing digital enterprises. In Proc. of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks Monterey California, June 2002. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html )."},{"key":"21_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/3-540-45263-X_9","volume-title":"Law-governed communities over the internet","author":"X. Ao","year":"2000","unstructured":"X. Ao, N. Minsky, T. Nguyen, and V. Ungureanu. Law-governed communities over the internet. In Proc. of Fourth International Conference on Coordination Models and Languages; Limassol, Cyprus; LNCS 1906, pages 133\u2013147, September 2000. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html )."},{"key":"21_CR3","unstructured":"X. Ao, N. Minsky, and V. Ungureanu. Formal treatment of certificate revocation under communal access control. In Proc. of the 2001 IEEE Symposium on Security and Privacy, May 2001, Oakland California, May 2001. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html )."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"J. Barkley, K. Beznosov, and J. Uppal. Supporting relationships in access control using role based access control. In Proceedings of the Fourth ACMWorkshop on Role-Based Access Control, pages 55\u201365, October 1999.","DOI":"10.1145\/319171.319177"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"J Barron. Dialogue and process design for interactive information systems using taxis. In Proc. SIGOA Conf, on Office Information Systems, June 1982.","DOI":"10.1145\/800210.806471"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"A. Bernstein. How can cooperative work tools support dynamic group processes? Bridging the specificity frontier. In Proceedings of ACM2000 Conference on Computer Supported Cooperative Work, December 2000.","DOI":"10.1145\/358916.358999"},{"issue":"1","key":"21_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"E. Bertino, E. Ferrari, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACMT ransactions on Information and System Security, 2(1):65\u2013104, February 1999.","journal-title":"ACMT ransactions on Information and System Security"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"F. Casati, S. Ceri, B. Pernici, and G. Pozzi. Semantic workflow interoperability. In Proceedings of EDBT\u201996, 5th International Conference on Extending Database Technology, pages 443\u2013462, March 1996.","DOI":"10.1007\/BFb0014170"},{"issue":"3","key":"21_CR9","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0169-023X(97)00033-5","volume":"24","author":"F. Casati","year":"1998","unstructured":"F. Casati, S. Ceri, B. Pernici, and G. Pozzi. Workflow evolution. Data & Knowledge Engineering, 24(3):211\u2013238, January 1998.","journal-title":"Data & Knowledge Engineering"},{"issue":"2","key":"21_CR10","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/S0306-4379(99)00010-1","volume":"24","author":"D. K. W. Chiu","year":"1999","unstructured":"D. K. W. Chiu, Q. Li, and K. Karlapalem. A meta modeling approach to work-flow management systems supporting exception handling. Information Systems, 24(2):159\u2013184, 1999.","journal-title":"Information Systems"},{"key":"21_CR11","unstructured":"J. Cole, Derrick J., Z. Milosevic, and K. Raymond. Policies in an enterprise specification. In Morris Sloman, editor, Proc. of Policy Worshop, 2001, Bristol UK, January 2001."},{"issue":"3\/4","key":"21_CR12","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1008799125984","volume":"9","author":"C. A. Ellis","year":"2000","unstructured":"C. A. Ellis and K. Keddara. ML-DEWS: Modeling language to support dynamic evolution with workflow systems. Computer Supported Cooperative Work, 9(3\/4):293\u2013333, November 2000.","journal-title":"Computer Supported Cooperative Work"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"D. Ferraiolo, J. Barkley, and R. Kuhn. A role based access control model and refernce implementation within a corporate intranets. ACMT ransactions on Information and System Security, 2(1), February 1999.","DOI":"10.1145\/300830.300834"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"C. Hagen and G. Alonso. Beyond the black box: Event-based inter-process communication in process support systems. In Proceedings of Intn\u2019l Conf. on Distributed Computing Systems (ICDCS\u201999), May-June 1999.","DOI":"10.1109\/ICDCS.1999.776547"},{"issue":"10","key":"21_CR15","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/32.879818","volume":"26","author":"C. Hagen","year":"2000","unstructured":"C. Hagen and G. Alonso. Exception handling in workflow management systems. IEEE Transactions on Software Engineering, 26(10):943\u2013958, October 2000.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"21_CR16","unstructured":"D. Hollingsworth. The workflow reference model. Technical Report WFMC-TC-1003 Issue 1.1, WfMC, January 1995."},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"N. R. Jennings, P. Faratin, M. J. Johnson, P. O\u2019Brien, and M. E. Wiegand. Using intelligent agents to manage business processes. In Proc. of First Intn\u2019l Conf. on The Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM96), pages 345\u2013360, 1996.","DOI":"10.1049\/ic:19960651"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"H. J\u00f8rgensen. Interaction as a framework for flexible workflow modelling. In Proceedings of ACM2001 Intn\u2019l Conf. on Supporting Group Work (GROUP 2001), October 2001.","DOI":"10.1145\/500286.500295"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"G. Karjoth. The authorization service of tivoli policy director. In Proc. of the 17th Annual Computer Security Applications Conference (ACSAC 2001), December 2001. (to appear).","DOI":"10.1109\/ACSAC.2001.991547"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"R. Medina-Mora, T. Winograd, R. Flores, and F. Flores. The action workflow approach to workflow management technology. In Proceedings of ACM1992 Conference on Computer Supported Cooperative Work, pages 281\u2013288, November 1992.","DOI":"10.1145\/143457.143530"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"N. H. Minsky. The imposition of protocols over open distributed systems. IEEE Transactions on Software Engineering, February 1991.","DOI":"10.1109\/32.67599"},{"key":"21_CR22","unstructured":"N. H. Minsky. Establishing accounting principles as invariants of financial systems. In Proc. of the Fourth International IFIP TC-11 WG 11.5 Conference on Integrity and Internal Control in Information Systems, Brussels, Belgium, November 2001. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html )."},{"issue":"3","key":"21_CR23","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1145\/352591.352592","volume":"9","author":"N. H. Minsky","year":"2000","unstructured":"N. H. Minsky and V. Ungureanu. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems. TOSEM, ACM Transactions on Software Engineering and Methodology, 9(3):273\u2013305, July 2000. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html ).","journal-title":"TOSEM, ACM Transactions on Software Engineering and Methodology"},{"issue":"10","key":"21_CR24","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1109\/32.879819","volume":"26","author":"T. Murata","year":"2000","unstructured":"T. Murata and A. Borgida. Handling of irregularities in human centered systems: A unified framework for data and processes. IEEE Transactions on Software Engineering, 26(10):959\u2013977, October 2000.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"21_CR25","unstructured":"B. Schneier. Applied Cryptography. John Wiley and Sons, 1996."},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"C. Serban, X. Ao, and N. H. Minsky. Establishing enterprise communities. In Proc. of the 5th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2001), Seattle, Washington, September 2001. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html ).","DOI":"10.1109\/EDOC.2001.950422"},{"key":"21_CR27","unstructured":"C. Serban and N. H. Minsky. Using java as a language for writing lgi-laws. Technical report, Rutgers University, July 2002."},{"key":"21_CR28","unstructured":"L. A. Suchman. Plans and Situated Actions: The Problem of Human-Machine Communication. Cambridge University Press, 1987."},{"key":"21_CR29","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/3-540-40026-5_12","volume-title":"Establishing business rules for inter-enterprise electronic commerce","author":"V. Ungureanu","year":"2000","unstructured":"V. Ungureanu and N. H. Minsky. Establishing business rules for inter-enterprise electronic commerce. In Proc. of the 14th International Symposium on DIStributed Computing (DISC 2000); Toledo, Spain; LNCS 1914, pages 179\u2013193, October 2000. (available from http:\/\/www.cs.rutgers.edu\/~minsky\/pubs.html )."},{"issue":"4","key":"21_CR30","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1142\/S0218843001000412","volume":"10","author":"W. M. P. Aalst van der","year":"2001","unstructured":"W. M. P. van der Aalst, P. Barthelmess, C. A. Ellis, and J. Wainer. Proclets: a framework for lightweight interacting workflow processes. International Journal of Cooperative Information Systems, 10(4):443\u2013481, 2001.","journal-title":"International Journal of Cooperative Information Systems"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2002: CoopIS, DOA, and ODBASE"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36124-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T13:30:56Z","timestamp":1557063056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36124-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540001065","9783540361244"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/3-540-36124-3_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}