{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:02:40Z","timestamp":1770753760874,"version":"3.50.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030311742","type":"print"},{"value":"9783030311759","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31175-9_10","type":"book-chapter","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T10:18:17Z","timestamp":1572949097000},"page":"163-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Walking Through the Semantics of Exclusive and Event-Based Gateways in BPMN Choreographies"],"prefix":"10.1007","author":[{"given":"Flavio","family":"Corradini","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Morichetta","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Re","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Tiezzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,4]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/507984","volume":"2678","author":"WM Aalst van der","year":"2013","unstructured":"van der Aalst, W.M.: Business process management: a comprehensive survey. ISRN Softw. Eng. 2678, 1\u201312 (2013)","journal-title":"ISRN Softw. Eng."},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.1145\/3183367","volume":"9","author":"J Mendling","year":"2018","unstructured":"Mendling, J., et al.: Blockchains for business process management - challenges and opportunities. ACM Trans. Manag. Inf. Syst. 9(1), 4:1\u20134:16 (2018)","journal-title":"ACM Trans. Manag. Inf. Syst."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Breu, R., et al.: Towards living inter-organizational processes. In: Business Informatics, pp. 363\u2013366. IEEE Computer Society (2013)","DOI":"10.1109\/CBI.2013.59"},{"key":"10_CR4","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-47208-9_5","volume-title":"Advances in Business ICT: New Ideas from Ongoing Research","author":"A Suchenia","year":"2017","unstructured":"Suchenia, A., Potempa, T., Lig\u0119za, A., Jobczyk, K., Kluza, K.: Selected approaches towards taxonomy of business process anomalies. In: Pe\u0142ech-Pilichowski, T., Mach-Kr\u00f3l, M., Olszak, C.M. (eds.) Advances in Business ICT: New Ideas from Ongoing Research. SCI, vol. 658, pp. 65\u201385. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-47208-9_5"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Basu, S., Bultan, T., Ouederni, M.: Deciding choreography realizability. In: POPL, pp. 191\u2013202. ACM (2012)","DOI":"10.1145\/2103621.2103680"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Marchetti, E., Morichetta, A.: Adequate monitoring of service compositions. In: 9th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 59\u201369 (2013)","DOI":"10.1145\/2491411.2491441"},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10270-011-0214-z","volume":"11","author":"E B\u00f6rger","year":"2012","unstructured":"B\u00f6rger, E.: Approaches to modeling business processes. Soft. Syst. Model. 11(3), 305\u2013318 (2012)","journal-title":"Soft. Syst. Model."},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.csi.2011.06.002","volume":"34","author":"M Chinosi","year":"2012","unstructured":"Chinosi, M., Trombetta, A.: BPMN: an introduction to the standard. Comput. Standards Interfaces 34(1), 124\u2013134 (2012)","journal-title":"Comput. Standards Interfaces"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2018.05.008","volume":"166","author":"F Corradini","year":"2018","unstructured":"Corradini, F., Fornari, F., Polini, A., Re, B., Tiezzi, F.: A formal approach to modeling and verification of business process collaborations. Sci. Comput. Program. 166, 35\u201370 (2018)","journal-title":"Sci. Comput. Program."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Corradini, F., Morichetta, A., Polini, A., Re, B., Tiezzi, F.: Collaboration vs. choreography conformance in BPMN 2.0: from theory to practice. In: EDOC, pp. 95\u2013104. IEEE (2018)","DOI":"10.1109\/EDOC.2018.00022"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-319-73117-9_23","volume-title":"SOFSEM 2018: Theory and Practice of Computer Science","author":"F Corradini","year":"2018","unstructured":"Corradini, F., Muzi, C., Re, B., Rossi, L., Tiezzi, F.: Global vs. local semantics of BPMN 2.0 OR-join. In: Tjoa, A.M., Bellatreche, L., Biffl, S., van Leeuwen, J., Wiedermann, J. (eds.) SOFSEM 2018. LNCS, vol. 10706, pp. 321\u2013336. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-73117-9_23"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-662-54458-7_25","volume-title":"Foundations of Software Science and Computation Structures","author":"L Cruz-Filipe","year":"2017","unstructured":"Cruz-Filipe, L., Larsen, K.S., Montesi, F.: The paths to choreography extraction. In: Esparza, J., Murawski, A.S. (eds.) FoSSaCS 2017. LNCS, vol. 10203, pp. 424\u2013440. Springer, Heidelberg (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-662-54458-7_25"},{"issue":"8","key":"10_CR13","first-page":"67","volume":"8","author":"M Dumas","year":"2018","unstructured":"Dumas, M., Hull, R., Mendling, J., Weber, I.: Blockchain technology for collaborative information systems. Dagstuhl Rep. 8(8), 67\u2013129 (2018)","journal-title":"Dagstuhl Rep."},{"key":"10_CR14","unstructured":"Ev\u00e9quoz, F., Sterren, C.: Waiting for the miracle: comparative analysis of twelve business process management systems regarding the support of BPMN 2.0 palette and export. Technical report, HES-SO (2011)"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-93767-0_6","volume-title":"Distributed Applications and Interoperable Systems","author":"A Francalanza","year":"2018","unstructured":"Francalanza, A., Mezzina, C.A., Tuosto, E.: Reversible choreographies via monitoring in erlang. In: Bonomi, S., Rivi\u00e8re, E. (eds.) DAIS 2018. LNCS, vol. 10853, pp. 75\u201392. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-93767-0_6"},{"key":"10_CR16","unstructured":"Geiger, M., Wirtz, G.: BPMN 2.0 serialization-standard compliance issues and evaluation of modeling tools. In: Enterprise Modelling and Information Systems Architectures (2013)"},{"key":"10_CR17","unstructured":"Gutschier, C., Hoch, R., Kaindl, H., Popp, R.: A pitfall with BPMN execution. In: WEB, pp. 7\u201313 (2014)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Hallal, R., Jaber, M., Abdallah, R.: From global choreography to efficient distributed implementation. In: HPCS, pp. 756\u2013763. IEEE (2018)","DOI":"10.1109\/HPCS.2018.00122"},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"9:1","DOI":"10.1145\/2827695","volume":"63","author":"K Honda","year":"2016","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. J. ACM 63(1), 9:1\u20139:67 (2016)","journal-title":"J. ACM"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Lange, J., Tuosto, E., Yoshida, N.: From communicating machines to graphical choreographies. In: POPL, pp. 221\u2013232. ACM (2015)","DOI":"10.1145\/2775051.2676964"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-19282-6_5","volume-title":"Coordination Models and Languages","author":"M Preda Dalla","year":"2015","unstructured":"Dalla Preda, M., Gabbrielli, M., Giallorenzo, S., Lanese, I., Mauro, J.: Dynamic choreographies. In: Holvoet, T., Viroli, M. (eds.) COORDINATION 2015. LNCS, vol. 9037, pp. 67\u201382. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-19282-6_5"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-36926-1_35","volume-title":"Seminal Contributions to Information Systems Engineering","author":"M zur Muehlen","year":"2013","unstructured":"zur Muehlen, M., Recker, J.: How much language is enough? Theoretical and practical use of the business process modeling notation. Seminal Contributions to Information Systems Engineering, pp. 429\u2013443. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-36926-1_35"},{"key":"10_CR23","unstructured":"OMG: Business Process Model and Notation (BPMN V 2.0) (2011)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Onggo, B.S.: Agent-based simulation model representation using BPMN. In: Formal Languages for Computer Simulation, pp. 378\u2013400. IGI Global (2014)","DOI":"10.4018\/978-1-4666-4369-7.ch012"},{"key":"10_CR25","first-page":"17","volume":"95","author":"E Tuosto","year":"2018","unstructured":"Tuosto, E., Guanciale, R.: Semantics of global view of choreographies. JLAMP 95, 17\u201340 (2018)","journal-title":"JLAMP"}],"container-title":["Lecture Notes in Computer Science","The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31175-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T10:49:21Z","timestamp":1572950961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31175-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030311742","9783030311759"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31175-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"4 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}