{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:53:09Z","timestamp":1725756789667},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319037363"},{"type":"electronic","value":"9783319037370"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03737-0_13","type":"book-chapter","created":{"date-parts":[[2013,11,16]],"date-time":"2013-11-16T06:39:14Z","timestamp":1384583954000},"page":"120-134","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-Aware Business Processes Modeling Notation (PrvBPMN) in the Context of Distributed Mobile Applications"],"prefix":"10.1007","author":[{"given":"Wadha","family":"Labda","sequence":"first","affiliation":[]},{"given":"Nikolay","family":"Mehandjiev","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Sampaio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.jvlc.2010.11.002","volume":"22","author":"A. Awad","year":"2011","unstructured":"Awad, A., Weidlich, M., Weske, M.: Visually specifying compliance rules and explaining their violations for business processes. Journal of Visual Languages & Computing\u00a022(1), 30\u201355 (2011)","journal-title":"Journal of Visual Languages & Computing"},{"issue":"4","key":"13_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MIC.2006.87","volume":"10","author":"B. Benatallah","year":"2006","unstructured":"Benatallah, B., Reza, H., Nezhad, H.R.M., Casati, F., Toumani, F., Ponge, J.: Service Mosaic: A Model- Driven Framework for Web Services Life-Cycle Management. IEEE Internet Computing\u00a010(4), 55\u201363 (2006)","journal-title":"IEEE Internet Computing"},{"key":"13_CR3","unstructured":"Business Process Modeling notation (BPMN), version 1.2, Object Management Group (OMG) (January 2009)"},{"key":"13_CR4","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1007\/978-3-642-36285-9_66","volume-title":"Business Process Management Workshops","author":"A.D. Brucker","year":"2013","unstructured":"Brucker, A.D., Hang, I.: Secure and Compliant Implementation of Business Process-Driven Systems. In: La Rosa, M., Soffer, P. (eds.) BPM 2012 Workshops. LNBIP, vol.\u00a0132, pp. 662\u2013674. Springer, Heidelberg (2013)"},{"key":"13_CR5","unstructured":"Clarke, R.: Introduction to dataveillance and information privacy, and definitions of terms (1999), \n                    \n                      http:\/\/www.anu.edu.au\/people\/Roger.Clarke\/DV\/Intro.html"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/978-3-540-87877-3_49","volume-title":"Conceptual Modeling - ER 2008","author":"G. Decker","year":"2008","unstructured":"Decker, G., Overdick, H., Weske, M.: Oryx- Sharing Conceptual Models on the Web. In: Li, Q., Spaccapietra, S., Yu, E., Oliv\u00e9, A. (eds.) ER 2008. LNCS, vol.\u00a05231, pp. 536\u2013537. Springer, Heidelberg (2008)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Han, R., Liu, K., Ju, Y., Zhao, J.: A Petri net theory-based method for modeling web service-based systems. In: 4th WiCOM, Dalian, China, pp. 1\u20137 (2008)","DOI":"10.1109\/WiCom.2008.2839"},{"key":"13_CR8","unstructured":"He, Q.: Privacy Enforcement with an Extended Role-Based Access Control Model, North Carolina State University at Raleigh, Raleigh, NC (2003)"},{"issue":"1","key":"13_CR9","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A. Hevner","year":"2004","unstructured":"Hevner, A., March, S., Park, J., Ram, S.: Design Science in Information Systems Research. MIS Quarterly\u00a028(1), 75\u2013106 (2004)","journal-title":"MIS Quarterly"},{"issue":"4","key":"13_CR10","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MSP.2008.95","volume":"6","author":"S. Landau","year":"2008","unstructured":"Landau, S.: Security and privacy landscape in emerging technologies. IEEE Security & Privacy\u00a06(4), 74\u201377 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Landgren, J., Nulden, U.: A study of emergency response work: patterns of mobile phone interaction. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1323\u20131332 (2007)","DOI":"10.1145\/1240624.1240824"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1007\/11896548_64","volume-title":"Current Trends in Database Technology \u2013 EDBT 2006","author":"A. Poulovassilis","year":"2006","unstructured":"Poulovassilis, A., Papamarkos, G., Wood, P.T.: Event-condition-action rule languages for the semantic web. In: Grust, T., et al. (eds.) EDBT 2006 Workshops. LNCS, vol.\u00a04254, pp. 855\u2013864. Springer, Heidelberg (2006)"},{"key":"13_CR13","unstructured":"Peterson, J.L.: Petri net theory and the modeling of systems. Prentice-Hall (1981)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Pearson, S.: Taking Account of Privacy When Designing Cloud Computing Services. In: ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009, pp. 44\u201352 (2009)","DOI":"10.1109\/CLOUD.2009.5071532"},{"issue":"4","key":"13_CR15","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1093\/ietisy\/e90-d.4.745","volume":"E90-D","author":"A. Rodr\u00edguez","year":"2007","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: A BPMN Extension for the Modeling of Security Requirements in Business Processes. IEICE - Transactions on Information and Systems\u00a0E90-D(4), 745\u2013752 (2007)","journal-title":"IEICE - Transactions on Information and Systems"},{"key":"13_CR16","unstructured":"Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Wohed, P.: On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling. In: Third Asia-Pacific Conference on Conceptual Modelling (APCCM 2006). CRPIT, vol.\u00a053, pp. 95\u2013104 (2006)"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1109\/ICCIT.2007.317","volume-title":"Proceedings of the 2007 International Conference on Convergence Information Technology (ICCIT 2007)","author":"Y.J. Song","year":"2007","unstructured":"Song, Y.J., Lee, D.H., Yim, J.G., Nam, T.Y.: Privacy Aware Adaptable Web Services Using Petri Nets. In: Proceedings of the 2007 International Conference on Convergence Information Technology (ICCIT 2007), pp. 1933\u20131938. IEEE Computer Society, Washington, DC (2007)"},{"key":"13_CR18","unstructured":"Semantic Web Rule Language (SWRL) (May 2004), \n                    \n                      http:\/\/www.w3.org\/Submission\/SWRL\/"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1007\/11926078_71","volume-title":"The Semantic Web - ISWC 2006","author":"V. Tanasescu","year":"2006","unstructured":"Tanasescu, V., Gugliotta, A., Domingue, J., Davies, R., Guti\u00e9rrez-Villar\u00edas, L., Rowlatt, M., Richardson, M., Stin\u010di\u0107, S.: A semantic web services GIS based emergency management application. In: Cruz, I., Decker, S., Allemang, D., Preist, C., Schwabe, D., Mika, P., Uschold, M., Aroyo, L.M. (eds.) ISWC 2006. LNCS, vol.\u00a04273, pp. 959\u2013966. Springer, Heidelberg (2006)"},{"key":"13_CR20","unstructured":"Thomas, M., Andoh-Baidoo, F., George, S.: Evresponse - moving beyond traditional emergency response notification. In: Proceedings of the Eleventh Americas Conference on Information Systems (2005)"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44895-0_1","volume-title":"Business Process Management","author":"W.M.P. Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M.: Business Process Management: A Survey. In: van der Aalst, W.M.P., Weske, M. (eds.) BPM 2003. LNCS, vol.\u00a02678, pp. 1\u201312. Springer, Heidelberg (2003)"},{"issue":"10","key":"13_CR22","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/S0950-5849(99)00016-6","volume":"41","author":"W.M.P. Aalst Van der","year":"1999","unstructured":"Van der Aalst, W.M.P.: Formalization and verification of event-driven process chains Inform. Software Technol.\u00a041(10), 639\u2013650 (1999)","journal-title":"Software Technol."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Xiaofeng, Y., Sommestad, T., Fung, C., Hung, P.C.K.: Emergency Response Framework for Aviation XML Services on MANET. In: Web Services, ICWS 2008, pp. 304-311 (2008)","DOI":"10.1109\/ICWS.2008.24"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Xu, W., Zlatanova, S.: Ontologies for Disaster Management Response. In: Li, J., Zlatanova, S., Fabbri, A. (eds.) Geomatics Solutions for Disaster Management, pp. 185\u2013200 (2010)","DOI":"10.1007\/978-3-540-72108-6_13"}],"container-title":["Communications in Computer and Information Science","Trends in Mobile Web Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03737-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T05:11:03Z","timestamp":1558674663000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03737-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319037363","9783319037370"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03737-0_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}