{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:09:21Z","timestamp":1773155361878,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031779077","type":"print"},{"value":"9783031779084","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-77908-4_14","type":"book-chapter","created":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T05:17:54Z","timestamp":1732857474000},"page":"227-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["SymboleoAC: An Access Control Model for\u00a0Legal Contracts"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9087-3041","authenticated-orcid":false,"given":"Sofana","family":"Alfuhaid","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7851-0199","authenticated-orcid":false,"given":"Amal Ahmed","family":"Anda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2414-1791","authenticated-orcid":false,"given":"Daniel","family":"Amyot","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9483-3940","authenticated-orcid":false,"given":"Marco","family":"Roveri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8926-5221","authenticated-orcid":false,"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Al-Azzoni, I., Iqbal, S.: Model-driven approach for generating smart contracts for access control. In: 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA), pp. 112\u2013115 (2023). https:\/\/doi.org\/10.1109\/BCCA58897.2023.10338863","DOI":"10.1109\/BCCA58897.2023.10338863"},{"issue":"1","key":"14_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39\u201391 (2006). https:\/\/doi.org\/10.1145\/1125808.1125810","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Ben\u00a0Fadhel, A., Bianculli, D., Briand, L.: GemRBAC-DSL: a high-level specification language for role-based access control policies. In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, pp. 179\u2013190. SACMAT 2016, ACM (2016). https:\/\/doi.org\/10.1145\/2914642.2914656","DOI":"10.1145\/2914642.2914656"},{"key":"14_CR4","volume-title":"Implementing Domain Specific Languages with Xtext and Xtend","author":"L Bettini","year":"2016","unstructured":"Bettini, L.: Implementing Domain Specific Languages with Xtext and Xtend, 2nd edn. Packt Publishing, Birmingham (2016)","edition":"2"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Forward, A., Badreddin, O., Lethbridge, T.C., Solano, J.: Model-driven rapid prototyping with Umple. Softw.: Pract. Exp. 42(7), 781\u2013797 (2012). https:\/\/doi.org\/10.1002\/spe.1155","DOI":"10.1002\/spe.1155"},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Frantz, C.K., Nowostawski, M.: From institutions to code: towards automated generation of smart contracts. In: 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp. 210\u2013215 (2016). https:\/\/doi.org\/10.1109\/FAS-W.2016.53","DOI":"10.1109\/FAS-W.2016.53"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"101454","DOI":"10.1016\/j.is.2019.101454","volume":"101","author":"C Griffo","year":"2021","unstructured":"Griffo, C., Almeida, J.P.A., Guizzardi, G., Nardi, J.C.: Service contract modeling in enterprise architecture: an ontology-based approach. Inf. Syst. 101, 101454 (2021). https:\/\/doi.org\/10.1016\/j.is.2019.101454","journal-title":"Inf. Syst."},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Griffo, C., Almeida, J.P.A., Lima, J.A., Prince Sales, T., Guizzardi, G.: Legal powers, subjections, disabilities, and immunities: ontological analysis and modeling patterns. Data Knowl. Eng. 148, 102219 (2023). https:\/\/doi.org\/10.1016\/j.datak.2023.102219","DOI":"10.1016\/j.datak.2023.102219"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"106762","DOI":"10.1016\/j.infsof.2021.106762","volume":"144","author":"M Hamdaqa","year":"2022","unstructured":"Hamdaqa, M., Met, L.A.P., Qasse, I.: iContractML 2.0: a domain-specific language for modeling and deploying smart contracts onto multiple blockchain platforms. Inf. Softw. Technol. 144, 106762 (2022). https:\/\/doi.org\/10.1016\/j.infsof.2021.106762","journal-title":"Inf. Softw. Technol."},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Kashmar, N., Adda, M., Atieh, M., Ibrahim, H.: Access control metamodel for policy specification and enforcement: from conception to formalization. Proc. Comput. Sci. 184, 887\u2013892 (2021). https:\/\/doi.org\/10.1016\/j.procs.2021.03.111. the 12th International Conference on Ambient Systems, Networks and Technologies (ANT) Affiliated Workshops","DOI":"10.1016\/j.procs.2021.03.111"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-540-24721-0_13","volume-title":"Fundamental Approaches to Software Engineering","author":"D-K Kim","year":"2004","unstructured":"Kim, D.-K., Ray, I., France, R., Li, N.: Modeling role-based access control using\u00a0parameterized\u00a0UML\u00a0models. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol. 2984, pp. 180\u2013193. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24721-0_13"},{"issue":"4","key":"14_CR12","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1017\/S0960129512000266","volume":"23","author":"M Kuhlmann","year":"2013","unstructured":"Kuhlmann, M., Sohr, K., Gogolla, M.: Employing UML and OCL for designing and analysing role-based access control. Math. Struct. Comput. Sci. 23(4), 796\u2013833 (2013). https:\/\/doi.org\/10.1017\/S0960129512000266","journal-title":"Math. Struct. Comput. Sci."},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-030-62522-1_20","volume-title":"Conceptual Modeling","author":"A Parvizimosaed","year":"2020","unstructured":"Parvizimosaed, A., Sharifi, S., Amyot, D., Logrippo, L., Mylopoulos, J.: Subcontracting, assignment, and substitution for legal contracts in Symboleo. In: Dobbie, G., Frank, U., Kappel, G., Liddle, S.W., Mayr, H.C. (eds.) ER 2020. LNCS, vol. 12400, pp. 271\u2013285. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62522-1_20"},{"issue":"6","key":"14_CR14","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1007\/s10270-022-01053-6","volume":"21","author":"A Parvizimosaed","year":"2022","unstructured":"Parvizimosaed, A., et al.: Specification and analysis of legal contracts with Symboleo. Softw. Syst. Model. 21(6), 2395\u20132427 (2022). https:\/\/doi.org\/10.1007\/s10270-022-01053-6","journal-title":"Softw. Syst. Model."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10270-023-01131-3","volume":"22","author":"E Planas","year":"2023","unstructured":"Planas, E., P\u00e9rez, S., Brambilla, M., Cabot, J.: Modeling and enforcing access control policies in conversational user interfaces. Softw. Syst. Model. 22, 1\u201320 (2023). https:\/\/doi.org\/10.1007\/s10270-023-01131-3","journal-title":"Softw. Syst. Model."},{"key":"14_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-024-01187-9","author":"A Rasti","year":"2024","unstructured":"Rasti, A., et al.: Automated generation of smart contract code from legal contract specifications with Symboleo2SC. Softw. Syst. Model. (2024). https:\/\/doi.org\/10.1007\/s10270-024-01187-9","journal-title":"Softw. Syst. Model."},{"issue":"9","key":"14_CR17","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R Sandhu","year":"1994","unstructured":"Sandhu, R., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32(9), 40\u201348 (1994). https:\/\/doi.org\/10.1109\/35.312842","journal-title":"IEEE Commun. Mag."},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Sharifi, S., Parvizimosaed, A., Amyot, D., Logrippo, L., Mylopoulos, J.: Symboleo: towards a specification language for legal contracts. In: 2020 IEEE 28th International Requirements Engineering Conference (RE), pp. 364\u2013369 (2020). https:\/\/doi.org\/10.1109\/RE48521.2020.00049","DOI":"10.1109\/RE48521.2020.00049"},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"De\u00a0Capitani\u00a0di Vimercati, S., Paraboschi, S., Samarati, P.: Access control: principles and solutions. Softw. Pract. Exp. 33(5), 397\u2013421 (2003). https:\/\/doi.org\/10.1002\/spe.513","DOI":"10.1002\/spe.513"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"W\u00f6hrer, M., Zdun, U.: Domain specific language for smart contract development. In: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp.\u00a01\u20139 (2020). https:\/\/doi.org\/10.1109\/ICBC48266.2020.9169399","DOI":"10.1109\/ICBC48266.2020.9169399"}],"container-title":["Lecture Notes in Business Information Processing","The Practice of Enterprise Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77908-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T06:16:45Z","timestamp":1737613005000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77908-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"ISBN":["9783031779077","9783031779084"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77908-4_14","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"30 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"PoEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Working Conference on The Practice of Enterprise Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"poem2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/poem2024.blogs.dsv.su.se","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}