{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:33Z","timestamp":1767340173257,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030892463"},{"type":"electronic","value":"9783030892470"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89247-0_10","type":"book-chapter","created":{"date-parts":[[2021,10,16]],"date-time":"2021-10-16T17:24:40Z","timestamp":1634405080000},"page":"142-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Runtime Monitoring Processes Across Blockchains"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2165-3698","authenticated-orcid":false,"given":"Shaun","family":"Azzopardi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4796-5665","authenticated-orcid":false,"given":"Joshua","family":"Ellul","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0743-6272","authenticated-orcid":false,"given":"Gordon J.","family":"Pace","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Alves, P.H., et al.: Exploring blockchain technology to improve multi-party relationship in business process management systems. In: Proceedings of the 22nd International Conference on Enterprise Information Systems - Volume 2: ICEIS, pp. 817\u2013825. INSTICC, SciTePress (2020). https:\/\/doi.org\/10.5220\/0009565108170825","DOI":"10.5220\/0009565108170825"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Azzopardi, S., Colombo, C., Pace, G.: A technique for automata-based verification with residual reasoning. In: Proceedings of the 8th International Conference on Model-Driven Engineering and Software Development, 25\u201327 February 2020, MODELSWARD 2020, Valletta, Malta (2020)","DOI":"10.5220\/0008981902370248"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-03769-7_8","volume-title":"Runtime Verification","author":"S Azzopardi","year":"2018","unstructured":"Azzopardi, S., Ellul, J., Pace, G.J.: Monitoring smart contracts: contractlarva and open challenges beyond. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 113\u2013137. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_8"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Azzopardi, S., Pace, G.J., Schapachnik, F.: Contract automata with reparations. In: Hoekstra, R. (ed.) Legal Knowledge and Information Systems - JURIX 2014: The Twenty-Seventh Annual Conference, Jagiellonian University, Krakow, Poland, 10\u201312 December 2014. Frontiers in Artificial Intelligence and Applications, vol. 271, pp. 49\u201354. IOS Press (2014). https:\/\/doi.org\/10.3233\/978-1-61499-468-8-49","DOI":"10.3233\/978-1-61499-468-8-49"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Azzopardi, S., Pace, G.J., Schapachnik, F.: On observing contracts: deontic contracts meet smart contracts. In: Palmirani, M. (ed.) Legal Knowledge and Information Systems - JURIX 2018: The Thirty-first Annual Conference, Groningen, The Netherlands, 12\u201314 December 2018. Frontiers in Artificial Intelligence and Applications, vol. 313, pp. 21\u201330. IOS Press (2018). https:\/\/doi.org\/10.3233\/978-1-61499-935-5-21","DOI":"10.3233\/978-1-61499-935-5-21"},{"key":"10_CR6","unstructured":"Buterin, V.: Chain interoperability. In: R3 Reports. R3 (September 2016)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-030-03427-6_23","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice","author":"C Colombo","year":"2018","unstructured":"Colombo, C., Ellul, J., Pace, G.J.: Contracts over smart contracts: recovering from violations dynamically. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11247, pp. 300\u2013315. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03427-6_23"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Colombo, C., Pace, G.J.: Comprehensive monitor-oriented compensation programming. In: Buhnova, B., Happe, L., Kofron, J. (eds.) Proceedings 11th International Workshop on Formal Engineering approaches to Software Components and Architectures, FESCA 2014, Grenoble, France, 12th April 2014. EPTCS, vol. 147, pp. 47\u201361 (2014). https:\/\/doi.org\/10.4204\/EPTCS.147.4","DOI":"10.4204\/EPTCS.147.0"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Corradini, F., Marcelletti, A., Morichetta, A., Polini, A., Re, B., Tiezzi, F.: Engineering trustable choreography-based systems using blockchain. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1470\u20131479. SAC 2020, ACM, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3341105.3373988","DOI":"10.1145\/3341105.3373988"},{"key":"10_CR10","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-030-49418-6_3","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"C Di Ciccio","year":"2020","unstructured":"Di Ciccio, C., Meroni, G., Plebani, P.: Business process monitoring on\u00a0blockchains: potentials and challenges. In: Nurcan, S., Reinhartz-Berger, I., Soffer, P., Zdravkovic, J. (eds.) BPMDS\/EMMSAD -2020. LNBIP, vol. 387, pp. 36\u201351. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49418-6_3"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Ellul, J., Pace, G.J.: Runtime verification of ethereum smart contracts. In: 2018 14th European Dependable Computing Conference (EDCC), pp. 158\u2013163 (2018). https:\/\/doi.org\/10.1109\/EDCC.2018.00036","DOI":"10.1109\/EDCC.2018.00036"},{"key":"10_CR12","unstructured":"Ethereum: Solidity (2016). https:\/\/docs.soliditylang.org\/. Accessed 10 Jan 2010"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Fdhila, W., Rinderle-Ma, S., Knuplesch, D., Reichert, M.: Decomposition-based verification of global compliance in process choreographies. In: 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC), pp. 77\u201386 (2020). https:\/\/doi.org\/10.1109\/EDOC49727.2020.00019","DOI":"10.1109\/EDOC49727.2020.00019"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-319-75632-5_6","volume-title":"Lectures on Runtime Verification","author":"A Francalanza","year":"2018","unstructured":"Francalanza, A., P\u00e9rez, J.A., S\u00e1nchez, C.: Runtime verification for decentralised and distributed systems. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 176\u2013210. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_6"},{"key":"10_CR15","unstructured":"Hotz, L., von Riegen, S., Pokahr, A., Braubach, L., Schwinghammer, T.: Monitoring bpmn-processes with rules in a distributed environment. In: A\u00eft-Kaci, H., Hu, Y., Nalepa, G.J., Palmirani, M., Roman, D. (eds.) Proceedings of the RuleML2012@ECAI Challenge, at the 6th International Symposium on Rules, Montpellier, France, 27th\u201329th August 2012. CEUR Workshop Proceedings, vol. 874. CEUR-WS.org (2012). http:\/\/ceur-ws.org\/Vol-874\/paper12.pdf"},{"key":"10_CR16","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-030-53337-3_14","volume-title":"Business Information Systems","author":"J Ladleif","year":"2020","unstructured":"Ladleif, J., Friedow, C., Weske, M.: An architecture for multi-chain business process choreographies. In: Abramowicz, W., Klein, G. (eds.) BIS 2020. LNBIP, vol. 389, pp. 184\u2013196. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-53337-3_14"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-030-26619-6_7","volume-title":"Business Process Management","author":"J Ladleif","year":"2019","unstructured":"Ladleif, J., Weske, M., Weber, I.: Modeling and enforcing blockchain-based choreographies. In: Hildebrandt, T., van Dongen, B.F., R\u00f6glinger, M., Mendling, J. (eds.) BPM 2019. LNCS, vol. 11675, pp. 69\u201385. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26619-6_7"},{"key":"10_CR18","unstructured":"L\u00f3pez-Pintado, O., Garc\u00eda-Ba\u00f1uelos, L., Dumas, M., Weber, I., Ponomarev, A.: CATERPILLAR: A business process execution engine on the ethereum blockchain. CoRR abs\/1808.03517 (2018). http:\/\/arxiv.org\/abs\/1808.03517"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Mendling, J., et al.: Blockchains for business process management - challenges and opportunities. ACM Trans. Manag. Inf. Syst. 9(1), 1\u201316 (2018). https:\/\/doi.org\/10.1145\/3183367","DOI":"10.1145\/3183367"},{"key":"10_CR20","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-030-58779-6_3","volume-title":"Business Process Management: Blockchain and Robotic Process Automation Forum","author":"R M\u00fchlberger","year":"2020","unstructured":"M\u00fchlberger, R., et al.: Foundational oracle patterns: connecting blockchain to the off-chain world. In: Asatiani, A., et al. (eds.) BPM 2020. LNBIP, vol. 393, pp. 35\u201351. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58779-6_3"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-030-48340-1_15","volume-title":"Euro-Par 2019: Parallel Processing Workshops","author":"M M\u00fcller","year":"2020","unstructured":"M\u00fcller, M., Garzon, S.R.: Blockchain-based trusted cross-organizational deliveries of sensor-equipped parcels. In: Schwardmann, U., et al. (eds.) Euro-Par 2019. LNCS, vol. 11997, pp. 191\u2013202. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-48340-1_15"},{"key":"10_CR22","unstructured":"(OMG), O.M.G.: Business process model and notation (bpmn) version 2.0 (January 2011). https:\/\/www.omg.org\/spec\/BPMN\/2.0\/PDF. Accessed 10 Jan 2010"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"S\u00e1nchez, C., et al.: A survey of challenges for runtime verification from advanced application domains (beyond software). Form. Methods Syst. Des. 54(3), 279\u2013335 (2019). https:\/\/doi.org\/10.1007\/s10703-019-00337-w","DOI":"10.1007\/s10703-019-00337-w"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Song, D.W., Lee, P.T.: Maritime logistics in the global supply chain (2009)","DOI":"10.1080\/13675560902749258"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Tosatto, S., Governatori, G., Beest, N.: Verifying compliance of process compositions through certification of its components. In: 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC), pp. 87\u201396. IEEE Computer Society, Los Alamitos, CA, USA (October 2020). https:\/\/doi.ieeecomputersociety.org\/10.1109\/EDOC49727.2020.00020","DOI":"10.1109\/EDOC49727.2020.00020"},{"key":"10_CR26","unstructured":"Tran, A.B., Lu, Q., Weber, I.: Lorikeet: a model-driven engineering tool for blockchain-based business process execution and asset management. In: van der Aalst, W.M.P., et al. (eds.) Proceedings of the Dissertation Award, Demonstration, and Industrial Track at BPM 2018 co-located with 16th International Conference on Business Process Management (BPM 2018), Sydney, Australia, 9\u201314 September 2018. CEUR Workshop Proceedings, vol. 2196, pp. 56\u201360. CEUR-WS.org (2018). http:\/\/ceur-ws.org\/Vol-2196\/BPM_2018_paper_12.pdf"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-45348-4_19","volume-title":"Business Process Management","author":"I Weber","year":"2016","unstructured":"Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A., Mendling, J.: Untrusted business process monitoring and execution using blockchain. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 329\u2013347. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45348-4_19"}],"container-title":["Lecture Notes in Computer Science","Fundamentals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89247-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T22:03:14Z","timestamp":1760565794000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89247-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030892463","9783030892470"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89247-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FSEN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamentals of Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fsen2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fsen.ir\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was hosted by IPM.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}