{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T23:00:07Z","timestamp":1752361207225,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031367564"},{"type":"electronic","value":"9783031367571"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36757-1_4","type":"book-chapter","created":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T16:01:40Z","timestamp":1688227300000},"page":"56-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Enterprise Modeling with\u00a0Conventions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8308-0189","authenticated-orcid":false,"given":"Stef","family":"Joosten","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4067-3088","authenticated-orcid":false,"given":"Ella","family":"Roubtsova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,2]]},"reference":[{"issue":"3","key":"4_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.17323\/1998-0663.2017.3.30.40","volume":"41","author":"EA Babkin","year":"2017","unstructured":"Babkin, E.A., Ponomarev, N.O.: Analysis of the consistency of enterprise architecture models using formal verification methods. Business Inf. 41(3), 30\u201340 (2017)","journal-title":"Business Inf."},{"key":"4_CR2","unstructured":"Beauvoir, P., Sarrodie, J.: Archi user guide. The Open Group (2013)"},{"key":"4_CR3","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-030-35151-9_13","volume-title":"The Practice of Enterprise Modeling","author":"G Blanco-Lain\u00e9","year":"2019","unstructured":"Blanco-Lain\u00e9, G., Sottet, J.-S., Dupuy-Chessa, S.: Using an enterprise architecture model for GDPR compliance principles. In: Gordijn, J., Gu\u00e9dria, W., Proper, H.A. (eds.) PoEM 2019. LNBIP, vol. 369, pp. 199\u2013214. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35151-9_13"},{"key":"4_CR4","unstructured":"Filet, P., van de Wetering, R., Joosten, S.: Enterprise architecture alignment. researchgate.net. Department of Information Sciences, Open University of the Netherland (2019)"},{"key":"4_CR5","unstructured":"Jackson, D.: Software abstractions: logic, language, and analysis. The MIT Press (2006)"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Joosten, S.: Relation Algebra as programming language using the Ampersand compiler. J. Logical Algebr. Methods Programm. 100, 113\u2013129 (2018). https:\/\/doi.org\/10.1016\/j.jlamp.2018.04.002","DOI":"10.1016\/j.jlamp.2018.04.002"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Joosten, S., Roubtsova, E., Haddouchi, E.M.: Constraint formalization for automated assessment of enterprise models. In: Proceedings of the 24th International Conference on Enterprise Information Systems - Volume 2: ICEIS, pp. 430\u2013441. SciTePress (2022)","DOI":"10.5220\/0011049200003179"},{"key":"4_CR8","first-page":"1","volume":"7","author":"M Korman","year":"2016","unstructured":"Korman, M., Lagerstr\u00f6m, R., Ekstedt, M.: Modeling enterprise authorization: a unified metamodel and initial validation. Complex Syst. Inf. Model. Quart. 7, 1\u201324 (2016)","journal-title":"Complex Syst. Inf. Model. Quart."},{"key":"4_CR9","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-642-01862-6_30","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"MM Lankhorst","year":"2009","unstructured":"Lankhorst, M.M., Proper, H.A., Jonkers, H.: The architecture of the Archimate language. In: Halpin, T., et al. (eds.) BPMDS\/EMMSAD -2009. LNBIP, vol. 29, pp. 367\u2013380. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01862-6_30"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jismd.2010092301","volume":"1","author":"MM Lankhorst","year":"2010","unstructured":"Lankhorst, M.M., Proper, H.A., Jonkers, H.: The anatomy of the ArchiMate language. Int. J. Inf. Syst. Model. Design (IJISMD) 1(1), 1\u201332 (2010)","journal-title":"Int. J. Inf. Syst. Model. Design (IJISMD)"},{"issue":"3","key":"4_CR11","doi-asserted-by":"publisher","first-page":"2285","DOI":"10.1007\/s10270-018-0661-x","volume":"18","author":"N Mayer","year":"2019","unstructured":"Mayer, N., Aubert, J., Grandry, E., Feltus, C., Goettelmann, E., Wieringa, R.: An integrated conceptual model for information system security risk management supported by enterprise architecture management. Softw. Syst. Model. 18(3), 2285\u20132312 (2019)","journal-title":"Softw. Syst. Model."},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-030-43520-2_13","volume-title":"Relational and Algebraic Methods in Computer Science","author":"Y Nakamura","year":"2020","unstructured":"Nakamura, Y.: Expressive power and succinctness of the positive calculus of relations. In: Fahrenberg, U., Jipsen, P., Winter, M. (eds.) RAMiCS 2020. LNCS, vol. 12062, pp. 204\u2013220. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43520-2_13"},{"key":"4_CR13","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-030-79976-2_10","volume-title":"Business Modeling and Software Design","author":"E Roubtsova","year":"2021","unstructured":"Roubtsova, E., Bosua, R.: Privacy as a service (PraaS): a conceptual model of GDPR to construct privacy services. In: Shishkov, B. (ed.) BMSD 2021. LNBIP, vol. 422, pp. 170\u2013189. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79976-2_10"},{"key":"4_CR14","unstructured":"Stef Joosten: AmpersandTarski GitBook project. Documentation of Ampersand. [GitHub]. https:\/\/ampersandtarski.gitbook.io\/documentation\/. Accessed 1 Oct 2022"},{"key":"4_CR15","unstructured":"Stef Joosten: HostFamilies. [GitHub]. https:\/\/github.com\/AmpersandTarski\/ampersand-models\/tree\/master\/ArchiChecker\/ResearchData\/HostFamilies.archimate. Accessed 1 Oct 2022"},{"key":"4_CR16","unstructured":"Stef Joosten: HostFamilies. Constraints. [GitHub]. https:\/\/github.com\/AmpersandTarski\/ampersand-models\/tree\/master\/ArchiChecker\/ResearchData\/hostfamilies.adl. Accessed 1 Oct 2022"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Tarski, A., Givant, S.R.: A formalization of set theory without variables, vol. 41. American Mathematical Soc. (1988)","DOI":"10.1090\/coll\/041"},{"key":"4_CR18","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-030-35151-9_7","volume-title":"The Practice of Enterprise Modeling","author":"J Tepandi","year":"2019","unstructured":"Tepandi, J., et al.: Towards a cross-border reference architecture for the once-only principle in Europe: an enterprise modelling approach. In: Gordijn, J., Gu\u00e9dria, W., Proper, H.A. (eds.) PoEM 2019. LNBIP, vol. 369, pp. 103\u2013117. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35151-9_7"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Berghammer, R., Neumann, F.: RelView \u2013 an OBDD-based computer algebra system for relations. In: Ganzha, V.G., Mayr, E.W., Vorozhtsov, E.V. (eds.) CASC 2005. LNCS, vol. 3718, pp. 40\u201351. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11555964_4","DOI":"10.1007\/11555964_4"},{"key":"4_CR20","unstructured":"The Open Group: Archimate 3.1 Specification. https:\/\/pubs.opengroup.org\/architecture\/archimate3-doc\/. Accessed 1 Oct 2022"},{"issue":"2","key":"4_CR21","first-page":"18","volume":"8","author":"Q Zhi","year":"2018","unstructured":"Zhi, Q., Yamamoto, S., Morisaki, S.: IMSA-Intra Model Security Assurance. J. Internet Serv. Inf. Secur. 8(2), 18\u201332 (2018)","journal-title":"J. Internet Serv. Inf. Secur."}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36757-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T16:02:12Z","timestamp":1688227332000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36757-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031367564","9783031367571"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36757-1_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"2 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BMSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Business Modeling and Software Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Utrecht","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bmsd2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.is-bmsd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}