{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:05:24Z","timestamp":1742969124805,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030625214"},{"type":"electronic","value":"9783030625221"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62522-1_10","type":"book-chapter","created":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T00:04:23Z","timestamp":1603929863000},"page":"134-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Modeling Behavioral Deontic Constraints Using UML and OCL"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8139-9986","authenticated-orcid":false,"given":"Antonio","family":"Vallecillo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4311-1117","authenticated-orcid":false,"given":"Martin","family":"Gogolla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,29]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.scico.2013.10.003","volume":"92","author":"F B\u00fcttner","year":"2014","unstructured":"B\u00fcttner, F., Gogolla, M.: On OCL-based imperative languages. Sci. Comput. Program. 92, 162\u2013178 (2014). \nhttps:\/\/doi.org\/10.1016\/j.scico.2013.10.003","journal-title":"Sci. Comput. Program."},{"key":"10_CR2","unstructured":"Desai, N., Gogolla, M., Hilken, F.: Executing models by filmstripping: enhancing validation by filmstrip templates and transformation alternatives. In: Proceedings of MODELS 2017 Workshops. CEUR Workshop Proceedings, vol. 2019, pp. 88\u201394. CEUR-WS.org (2017). \nhttp:\/\/ceur-ws.org\/Vol-2019\/exe_2.pdf"},{"key":"10_CR3","unstructured":"Gogolla, M., Hamann, L., Hilken, F., Kuhlmann, M., France, R.B.: From application models to filmstrip models: an approach to automatic validation of model dynamics. In: Proceedings of Modellierung 2014. LNI, vol. 225, pp. 273\u2013288. GI (2014)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1016\/j.cl.2017.10.001","volume":"54","author":"M Gogolla","year":"2018","unstructured":"Gogolla, M., Hilken, F., Doan, K.H.: Achieving model quality through model validation, verification and exploration. Comput. Lang. Syst. Struct. 54, 474\u2013511 (2018). \nhttps:\/\/doi.org\/10.1016\/j.cl.2017.10.001","journal-title":"Comput. Lang. Syst. Struct."},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Gogolla, M., Hilken, F., Doan, K., Desai, N.: Checking UML and OCL model behavior with filmstripping and classifying terms. In: Proceedings of TAP 2017. LNCS, vol. 10375, pp. 119\u2013128. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-61467-0_7","DOI":"10.1007\/978-3-319-61467-0_7"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Gogolla, M., Vallecillo, A.: On softening OCL invariants. J. Object Technol. 18(2), 6:1\u20136:22 (2019). \nhttps:\/\/doi.org\/10.5381\/jot.2019.18.2.a6","DOI":"10.5381\/jot.2019.18.2.a6"},{"key":"10_CR7","unstructured":"Halpin, T.: Business rule modality (2008). \nhttp:\/\/www.orm.net\/pdf\/RuleModality.pdf"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Halpin, T.: Object-Role Modeling Fundamentals. Technics Publications (2015)","DOI":"10.1007\/978-1-4899-7993-3_251-2"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Hilken, F., Gogolla, M.: Verifying linear temporal logic properties in UML\/OCL class diagrams using filmstripping. In: Proceedings of DSD 2016, pp. 708\u2013713. IEEE Computer Society (2016). \nhttps:\/\/doi.org\/10.1109\/DSD.2016.42","DOI":"10.1109\/DSD.2016.42"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Hilken, F., Hamann, L., Gogolla, M.: Transformation of UML and OCL models into filmstrip models. In: Proceedings of ICMT 2014. LNCS, vol. 8568, pp. 170\u2013185. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-08789-4_13","DOI":"10.1007\/978-3-319-08789-4_13"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"van den Hoven, J.: Ethics for the digital age: where are the moral specs? In: Proceedings of ECSS 2015 Informatics in the Future, pp. 65\u201376 (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-55735-9_6","DOI":"10.1007\/978-3-319-55735-9_6"},{"key":"10_CR12","unstructured":"ISO\/IEC 15414, ITU-T Rec. X.911: Information technology - Open distributed processing - Reference model - Enterprise language. ISO\/IEC and ITU-T (2015)"},{"key":"10_CR13","unstructured":"ISO\/IEC 19793, ITU-T Rec. X.906: Information technology - Open distributed processing - Use of UML for ODP system specifications. ISO\/IEC, ITU-T (2015)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-642-21952-8_21","volume-title":"Objects, Models, Components, Patterns","author":"M Kuhlmann","year":"2011","unstructured":"Kuhlmann, M., Hamann, L., Gogolla, M.: Extensive validation of OCL models by integrating SAT solving into USE. In: Bishop, J., Vallecillo, A. (eds.) TOOLS 2011. LNCS, vol. 6705, pp. 290\u2013306. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21952-8_21"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Linington, P.F., Milosevic, Z., Tanaka, A., Vallecillo, A.: Building Enterprise Systems with ODP \u2013 An Introduction to Open Distributed Processing. Chapman & Hall\/CRC Press (2012)","DOI":"10.1201\/b11151"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Linington, P.F., Miyazaki, H., Vallecillo, A.: Obligations and delegation in the ODP enterprise language. In: Proceedings of VORTE 2012 (EDOC Workshops), pp. 146\u2013155. IEEE Computer Society (2012). \nhttps:\/\/doi.org\/10.1109\/EDOCW.2012.28","DOI":"10.1109\/EDOCW.2012.28"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Linington, P.F., Neal, S.: Using policies in the checking of business to business contracts. In: Proceedings of POLICY 2003, pp. 207\u2013218. IEEE Computer Society (2003). \nhttps:\/\/doi.org\/10.1109\/POLICY.2003.1206975","DOI":"10.1109\/POLICY.2003.1206975"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Meyer, J.C., Weigand, H., Wieringa, R.J.: A specification language for static, dynamic and deontic integrity constraints. In: Proceedings of MFDBS 1989. LNCS, vol. 364, pp. 347\u2013366. Springer, Jeidelberg (1989). \nhttps:\/\/doi.org\/10.1007\/3-540-51251-9_23","DOI":"10.1007\/3-540-51251-9_23"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Milosevic, Z.: Ethics in digital health: a deontic accountability framework. In: Proceedings of EDOC 2019, pp. 105\u2013111. IEEE (2019). \nhttps:\/\/doi.org\/10.1109\/EDOC.2019.00022","DOI":"10.1109\/EDOC.2019.00022"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"e6","DOI":"10.1017\/S0269888920000089","volume":"35","author":"Z Milosevic","year":"2020","unstructured":"Milosevic, Z.: Enacting policies in digital health: a case for smart legal contracts and distributed ledgers? Knowl. Eng. Rev. 35, e6 (2020). \nhttps:\/\/doi.org\/10.1017\/S0269888920000089","journal-title":"Knowl. Eng. Rev."},{"key":"10_CR21","unstructured":"Object Management Group: Semantics Of Business Vocabulary And Rules. Version 1.5 (Dec 2019), OMG document formal\/19-10-02"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Ramos, P.N.: Deontic database constraints - from UML to SQL. In: Proceedings of ICEIS 2013, pp. 102\u2013109. SciTePress (2013). \nhttps:\/\/doi.org\/10.5220\/0004415801020109","DOI":"10.5220\/0004415801020109"},{"key":"10_CR23","unstructured":"R\u00f6nnedal, D.: An Introduction to Deontic Logic. CreateSpace (2010)"},{"key":"10_CR24","doi-asserted-by":"publisher","unstructured":"Solhaug, B., St\u00f8len, K.: Compositional refinement of policies in UML - exemplified for access control. In: Proceedings of ESORICS 2008. LNCS, vol. 5283, pp. 300\u2013316. Springer, Cham (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-88313-5_20","DOI":"10.1007\/978-3-540-88313-5_20"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/0169-023X(89)90038-4","volume":"4","author":"RJ Wieringa","year":"1989","unstructured":"Wieringa, R.J., Meyer, J.C., Weigand, H.: Specifying dynamic and deontic integrity constraints. Data Knowl. Eng. 4, 157\u2013189 (1989). \nhttps:\/\/doi.org\/10.1016\/0169-023X(89)90038-4","journal-title":"Data Knowl. Eng."}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62522-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T00:09:16Z","timestamp":1603930156000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62522-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030625214","9783030625221"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62522-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Conceptual Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"er2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/er2020.big.tuwien.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}