{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:49:17Z","timestamp":1725540557710},"publisher-location":"Boston, MA","reference-count":26,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441913241"},{"type":"electronic","value":"9781441913258"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-1-4419-1325-8_8","type":"book-chapter","created":{"date-parts":[[2009,11,6]],"date-time":"2009-11-06T16:33:53Z","timestamp":1257525233000},"page":"135-153","source":"Crossref","is-referenced-by-count":0,"title":["ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation"],"prefix":"10.1007","author":[{"given":"Stanley Y.W.","family":"Su","sequence":"first","affiliation":[]},{"given":"Howard W.","family":"Beck","sequence":"additional","affiliation":[]},{"given":"Xuelian","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"DePree","sequence":"additional","affiliation":[]},{"given":"Seema","family":"Degwekar","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Minsoo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Carla","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Coggeshall","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Bostock","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,12]]},"reference":[{"key":"8_CR1","unstructured":"Business Rules Group, \u201cDefining business rules \u2013 what are they really?\u201d Available: http:\/\/www.businessrulesgroup.org\/first_paper\/br01c0.htm"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/69.877511","volume":"12","author":"N Bassiliades","year":"2000","unstructured":"Bassiliades N, Vlahavas I, and Elmagarmid AK (2000) E-DEVICE: an extensible active knowledge base system with multiple rule type support. IEEE Transactions on Knowledge and Data Engineering, 12, 824\u2013844","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Bry F, Eckert M, P\u0103tr\u00e2njan P, Romanenko I (2006) Realizing business processes with ECA rules: benefits, challenges, limits. In: Proceedings of International Workshop on Principles and Practice of Semantic Web Reasoning, pp. 48\u201362","DOI":"10.1007\/11853107_4"},{"key":"8_CR4","unstructured":"Beck HW (2008) Evolution of database designs for knowledge management in agriculture and natural resources. Journal of Information Technology in Agriculture, 3(1)"},{"key":"8_CR5","unstructured":"Degwekar S, Su SYW (2006) Knowledge sharing in a collaborative business environment. In: Proceedings of the Fifth Workshop on e-Business, Milwaukee, Wisconsin. Abstract on page 60 and paper on CD"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Degwekar S, DePree J, Beck H, Su SYW (2007) A distributed event-triggered knowledge sharing system for agricultural homeland security. In: the Proceedings of the 2007 IEEE Conference on Technologies for Homeland Security, Woburn, MA, pp. 180\u2013185","DOI":"10.1109\/THS.2007.370042"},{"key":"8_CR7","unstructured":"Degwekar S, DePree J, Beck H, Thomas CS, Su SYW (2007) Event-triggered data and knowledge sharing among collaborating government organizations. In: Proceedings of the 8th Annual International Conference on Digital Government Research, Philadelphia, PA, pp. 102\u2013111"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Degwekar S, DePree J, Su SYW, Beck H (2007) A distributed event-triggered knowledge sharing system: system demo. Received the Best System Demo Award at the 8th Annual International Conference on Digital Government Research, Philadelphia, PA","DOI":"10.1109\/THS.2007.370042"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Hayton RJ, Bacon JM, Moody K (1998) Access control in an open distributed environment. In: Proceedings of the IEEE Symposium on Security and Privacy, California, pp. 3\u201314","DOI":"10.1109\/SECPRI.1998.674819"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Johnston W, Mudumbai S, Thompson M (1998) Authorization and attribute certificates for widely distributed access control. In: Proceedings of the IEEE Seventh International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 340\u2013345","DOI":"10.1109\/ENABL.1998.725715"},{"key":"8_CR11","unstructured":"National Plant Diagnostic Network, http:\/\/www.npdn.org"},{"key":"8_CR12","unstructured":"Miller GA, WordNet, a lexical database for the English language, Available: http:\/\/wordnet.princeton.edu \/"},{"key":"8_CR13","unstructured":"OASIS, Business Process Execution Language, Available: http:\/\/www.oasis-open.org\/specs\/index.php"},{"key":"8_CR14","unstructured":"Object Management Group. (2001) Object Constraint Language Specification. Available: http:\/\/www.omg.org"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Rosenberg F, Dustdar S (2005) Towards a distributed service-oriented business rules system. IEEE Third European Conference on Web Services Proceedings","DOI":"10.1109\/ECOWS.2005.28"},{"key":"8_CR16","unstructured":"Rouvellou I, et al. (2000) Combining different business rules technologies: a rationalization. OOPSLA 2000 Workshop on Best-practices in Business Rule Design and Implementation Proceedings"},{"key":"8_CR17","unstructured":"Rule Markup Language, Initiative, Available: http:\/\/www.ruleml.org"},{"key":"8_CR18","volume-title":"Knowledge Representation: Logical, Philosophical and Computational Foundations","author":"JF Sowa","year":"2000","unstructured":"Sowa JF (2000) Knowledge Representation: Logical, Philosophical and Computational Foundations. Brooks Cole Publishing Co., Pacific Grove, CA"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Sandhu R, Ferraiolo D, Kuhn R (2000) The NIST model for role-based access control: towards a unified standard. In: Proceedings of the First ACM Workshop on Role-Based Access Control, Berlin, Germany, pp. 47\u201363","DOI":"10.1145\/344287.344301"},{"key":"8_CR20","unstructured":"Sirin E, Parsia B, Grau BC, Kalyanpur A, Katz Y (2004) Pellet: a practical owl-dl reasoner the 3rd International Semantic Web Conference (ISWC2004), Hiroshima, Japan"},{"key":"8_CR21","unstructured":"The National Plant Diagnostic Network Standard Operating Procedure for APHIS-PPQ Pest of Concern Scenario \u2013 General SOP, February 3, 2009"},{"key":"8_CR22","volume-title":"Principles of Database Systems","author":"J Ullma","year":"1982","unstructured":"Ullma J (1982) Principles of Database Systems, 2nd ed. Computer Science Press, Rockville, MD","edition":"2"},{"key":"8_CR23","volume-title":"Principles of Database and Knowledge-Base Systems","author":"J Ullman","year":"1988","unstructured":"Ullman J (1988) Principles of Database and Knowledge-Base Systems. Computer Science Press, Rockville, MD"},{"key":"8_CR24","volume-title":"Office of Technology Assessment, Harmful Non-Indigenous Species in the United States","author":"U.S. Congress","year":"1993","unstructured":"U.S. Congress (1993) Office of Technology Assessment, Harmful Non-Indigenous Species in the United States. U.S. Government Printing Office, OTA-F-565 Washington, DC"},{"key":"8_CR25","volume-title":"Active Database Systems, Triggers and Rules for Advanced Database Processing","author":"J Widom","year":"1996","unstructured":"Widom J, Ceri S (1996) Active Database Systems, Triggers and Rules for Advanced Database Processing. Morgan Kaufmann, San Mateo, CA"},{"key":"8_CR26","unstructured":"WFMC, Workflow Management Coalition Interface 1: Process Definition Interchange Process Model, Available: http:\/\/www.wfmc.org\/standards\/docs\/if19807m.pdf"}],"container-title":["Annals of Information Systems","Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-1325-8_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T05:09:08Z","timestamp":1605676148000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-1325-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,12]]},"ISBN":["9781441913241","9781441913258"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-1325-8_8","relation":{},"ISSN":["1934-3221","1934-3213"],"issn-type":[{"type":"print","value":"1934-3221"},{"type":"electronic","value":"1934-3213"}],"subject":[],"published":{"date-parts":[[2009,10,12]]}}}