{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:25:57Z","timestamp":1760833557097,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032086228","type":"print"},{"value":"9783032086235","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08623-5_10","type":"book-chapter","created":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:42:15Z","timestamp":1760784135000},"page":"185-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tree-Based Compliance Verification: Bridging the\u00a0Gap Between Compliance Requirements and\u00a0Process Execution"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5482-7994","authenticated-orcid":false,"given":"Johannes","family":"Loebbecke","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6332-5801","authenticated-orcid":false,"given":"Juergen","family":"Mangler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5656-6108","authenticated-orcid":false,"given":"Stefanie","family":"Rinderle-Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,19]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/J.JVLC.2010.11.002","volume":"22","author":"A Awad","year":"2011","unstructured":"Awad, A., Weidlich, M., Weske, M.: Visually specifying compliance rules and explaining their violations for business processes. J. Vis. Lang. Comput. 22(1), 30\u201355 (2011). https:\/\/doi.org\/10.1016\/J.JVLC.2010.11.002","journal-title":"J. Vis. Lang. Comput."},{"key":"10_CR2","unstructured":"Bernal, \u00c1., Montero, F., Cabanillas, C., Fernandez, P., Resinas, M.: STATUS: a low-code business process compliance management system. In: BPM Demos, pp. 141\u2013145 (2024). https:\/\/ceur-ws.org\/Vol-3758\/paper-26.pdf"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.eswa.2016.08.040","volume":"65","author":"A Burattin","year":"2016","unstructured":"Burattin, A., Maggi, F.M., Sperduti, A.: Conformance checking based on multi-perspective declarative process models. Expert Syst. Appl. 65, 194\u2013211 (2016)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"10_CR4","doi-asserted-by":"publisher","first-page":"1564","DOI":"10.1109\/TSC.2020.3001292","volume":"15","author":"C Cabanillas","year":"2022","unstructured":"Cabanillas, C., Resinas, M., Ruiz-Cort\u00e9s, A.: A mashup-based framework for business process compliance checking. IEEE Trans. Serv. Comput. 15(3), 1564\u20131577 (2022). https:\/\/doi.org\/10.1109\/TSC.2020.3001292","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1016\/J.DSS.2012.12.012","volume":"54","author":"F Caron","year":"2013","unstructured":"Caron, F., Vanthienen, J., Baesens, B.: Comprehensive rule-based compliance checking and risk management with process mining. Decis. Support Syst. 54(3), 1357\u20131369 (2013). https:\/\/doi.org\/10.1016\/J.DSS.2012.12.012","journal-title":"Decis. Support Syst."},{"key":"10_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-031-41623-1_8","volume-title":"Business Process Management Forum","author":"Q Chen","year":"2023","unstructured":"Chen, Q., Winter, K., Rinderle-Ma, S.: Predicting unseen process behavior based on context information from compliance constraints. In: Di Francescomarino, C., Burattin, A., Janiesch, C., Sadiq, S. (eds.) BPM 2023. LNBIP, vol. 490, pp. 127\u2013144. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-41623-1_8"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/S10270-014-0395-3","volume":"15","author":"A Elgammal","year":"2016","unstructured":"Elgammal, A., T\u00fcretken, O., van den Heuvel, W., Papazoglou, M.P.: Formalizing and appling compliance patterns for business process compliance. Softw. Syst. Model. 15(1), 119\u2013146 (2016). https:\/\/doi.org\/10.1007\/S10270-014-0395-3","journal-title":"Softw. Syst. Model."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"F\u00f6rster, A., Engels, G., Schattkowsky, T., Straeten, R.V.D.: Verification of business process quality constraints based on visual process patterns. In: Symposium on Theoretical Aspects of Software Engineering. pp. 197\u2013208 (2007)","DOI":"10.1109\/TASE.2007.56"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Goedertier, S., Vanthienen, J.: Designing compliant business processes with obligations and permissions. In: BPM Workshops, pp. 5\u201314 (2006)","DOI":"10.1007\/11837862_2"},{"key":"10_CR10","unstructured":"Governatori, G., Rotolo, A.: A conceptually rich model of business process compliance. In: Asia-Pacific Conference on Conceptual Modelling, pp. 3\u201312 (2010)"},{"key":"10_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMPIND.2019.103181","author":"H Groefsema","year":"2020","unstructured":"Groefsema, H., van Beest, N.R.T.P., Armas-Cervantes, A.: Efficient conditional compliance checking of business process models. Comput. Ind. (2020). https:\/\/doi.org\/10.1016\/J.COMPIND.2019.103181","journal-title":"Comput. Ind."},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Haarmann, S., Holfter, A., Pufahl, L., Weske, M.: Formal framework for checking compliance of data-driven case management. J. Data Semant. 143\u2013163 (2021). https:\/\/doi.org\/10.1007\/s13740-021-00120-3","DOI":"10.1007\/s13740-021-00120-3"},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10115-017-1142-1","volume":"57","author":"M Hashmi","year":"2018","unstructured":"Hashmi, M., Governatori, G., Lam, H.-P., Wynn, M.T.: Are we done with business process compliance: state of the art and challenges ahead. Knowl. Inf. Syst. 57(1), 79\u2013133 (2018). https:\/\/doi.org\/10.1007\/s10115-017-1142-1","journal-title":"Knowl. Inf. Syst."},{"issue":"3","key":"10_CR14","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/S10796-015-9558-1","volume":"18","author":"M Hashmi","year":"2016","unstructured":"Hashmi, M., Governatori, G., Wynn, M.T.: Normative requirements for regulatory compliance: an abstract formal framework. Inf. Syst. Front. 18(3), 429\u2013455 (2016). https:\/\/doi.org\/10.1007\/S10796-015-9558-1","journal-title":"Inf. Syst. Front."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Hildebrandt, T.T., Mukkamala, R.R.: Declarative event-based workflow as distributed dynamic condition response graphs. arXiv preprint arXiv:1110.4161 (2011)","DOI":"10.4204\/EPTCS.69.5"},{"key":"10_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/S00607-022-01093-2","author":"S Ihde","year":"2022","unstructured":"Ihde, S., Pufahl, L., V\u00f6lker, M., Goel, A., Weske, M.: A framework for modeling and executing task-specific resource allocations in business processes. Computing (2022). https:\/\/doi.org\/10.1007\/S00607-022-01093-2","journal-title":"Computing"},{"issue":"3","key":"10_CR17","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s10270-016-0526-0","volume":"16","author":"D Knuplesch","year":"2017","unstructured":"Knuplesch, D., Reichert, M.: A visual language for modeling multiple perspectives of business process compliance rules. Softw. Syst. Model. 16(3), 715\u2013736 (2017)","journal-title":"Softw. Syst. Model."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.jvlc.2014.12.008","volume":"28","author":"IA Letia","year":"2015","unstructured":"Letia, I.A., Goron, A.: Model checking as support for inspecting compliance to rules in flexible processes. J. Vis. Lang. Comput. 28, 100\u2013121 (2015)","journal-title":"J. Vis. Lang. Comput."},{"key":"10_CR19","unstructured":"L\u00f3pez, H.A., Hildebrandt, T.T.: Three decades of formal methods in business process compliance: a systematic literature review. CoRR abs\/2410.10906 (2024)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Ly, L.T., Indiono, C., Mangler, J., Rinderle-Ma, S.: Data transformation and semantic log purging for process mining. Adv. Inf. Syst. Eng. (2012)","DOI":"10.1007\/978-3-642-31095-9_16"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/J.IS.2015.02.007","volume":"54","author":"LT Ly","year":"2015","unstructured":"Ly, L.T., Maggi, F.M., Montali, M., Rinderle-Ma, S., Aalst, W.M.P.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209\u2013234 (2015). https:\/\/doi.org\/10.1016\/J.IS.2015.02.007","journal-title":"Inf. Syst."},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Ly, L.T., Rinderle-Ma, S., G\u00f6ser, K., Dadam, P.: On enabling integrated process compliance with semantic constraints in process management systems - requirements, challenges, solutions. Inf. Syst. Front. 195\u2013219 (2012). https:\/\/doi.org\/10.1007\/S10796-009-9185-9","DOI":"10.1007\/S10796-009-9185-9"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Neuberger, J., Ackermann, L., van\u00a0der Aa, H., Jablonski, S.: A universal prompting strategy for extracting process model information from natural language text using large language models. In: Maass, W., Han, H., Yasar, H., Multari, N. (eds) ER 2024. LNCS, vol. 15238, pp. 38\u201355 (2024). https:\/\/doi.org\/10.1007\/978-3-031-75872-0_3","DOI":"10.1007\/978-3-031-75872-0_3"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-031-15565-9_12","volume-title":"Explainable and Transparent AI and Multi-Agent Systems","author":"T Novotna","year":"2022","unstructured":"Novotna, T., Libal, T.: An evaluation of methodologies for legal formalization. In: Calvaresi, D., Najjar, A., Winikoff, M., Fr\u00e4mling, K. (eds.) EXTRAAMAS 2022. LNCS, vol. 13283, pp. 189\u2013203. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15565-9_12"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Pesic, M., Schonenberg, H., van\u00a0der Aalst, W.M.P.: DECLARE: full support for loosely-structured processes. In: Enterprise Distributed Object Computing Conference, pp. 287\u2013300 (2007)","DOI":"10.1109\/EDOC.2007.14"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Rinderle-Ma, S., Mangler, J., Ritter, D.: Fundamentals of Information Systems Interoperability - Data, Services, and Processes. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-48322-6"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-75183-0_12","volume-title":"Business Process Management","author":"S Sadiq","year":"2007","unstructured":"Sadiq, S., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149\u2013164. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75183-0_12"},{"issue":"4","key":"10_CR28","doi-asserted-by":"publisher","first-page":"4943","DOI":"10.1007\/S11227-023-05626-0","volume":"80","author":"X Sun","year":"2024","unstructured":"Sun, X., Yang, S., Zhao, C., Yu, D.: Design-time business process compliance assessment based on multi-granularity semantic information. J. Supercomput. 80(4), 4943\u20134971 (2024). https:\/\/doi.org\/10.1007\/S11227-023-05626-0","journal-title":"J. Supercomput."},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-38709-8_20","volume-title":"Advanced Information Systems Engineering","author":"E Ramezani Taghiabadi","year":"2013","unstructured":"Ramezani Taghiabadi, E., Fahland, D., Dongen, B.F., Aalst, W.M.P.: Diagnostic information for compliance checking of temporal compliance requirements. In: Salinesi, C., Norrie, M.C., Pastor, \u00d3. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 304\u2013320. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38709-8_20"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-540-85758-7_10","volume-title":"Business Process Management","author":"J Vanhatalo","year":"2008","unstructured":"Vanhatalo, J., V\u00f6lzer, H., Koehler, J.: The refined process structure tree. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 100\u2013115. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85758-7_10"},{"key":"10_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-540-74974-5_4","volume-title":"Service-Oriented Computing \u2013 ICSOC 2007","author":"J Vanhatalo","year":"2007","unstructured":"Vanhatalo, J., V\u00f6lzer, H., Leymann, F.: Faster and more focused control-flow analysis for business process models through SESE decomposition. In: Kr\u00e4mer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 43\u201355. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74974-5_4"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-62522-1_14","volume-title":"Conceptual Modeling","author":"K Winter","year":"2020","unstructured":"Winter, K., Aa, H., Rinderle-Ma, S., Weidlich, M.: Assessing the compliance of business process models with regulatory documents. In: Dobbie, G., Frank, U., Kappel, G., Liddle, S.W., Mayr, H.C. (eds.) ER 2020. LNCS, vol. 12400, pp. 189\u2013203. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62522-1_14"},{"key":"10_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/11912873_18","volume-title":"Web Information Systems \u2013 WISE 2006","author":"J Yu","year":"2006","unstructured":"Yu, J., Manh, T.P., Han, J., Jin, Y., Han, Y., Wang, J.: Pattern based property specification and verification for service composition. In: Aberer, K., Peng, Z., Rundensteiner, E.A., Zhang, Y., Li, X. (eds.) WISE 2006. LNCS, vol. 4255, pp. 156\u2013168. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11912873_18"},{"issue":"1","key":"10_CR34","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3390\/software2010004","volume":"2","author":"A Zasada","year":"2023","unstructured":"Zasada, A., Hashmi, M., Fellmann, M., Knuplesch, D.: Evaluation of compliance rule languages for modelling regulatory compliance requirements. Software 2(1), 71\u2013120 (2023). https:\/\/doi.org\/10.3390\/software2010004","journal-title":"Software"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08623-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:42:19Z","timestamp":1760784139000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08623-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"ISBN":["9783032086228","9783032086235"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08623-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,19]]},"assertion":[{"value":"19 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Conceptual Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poitiers","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"er2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/er2025.ensma.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}