{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:45:53Z","timestamp":1770885953077,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319079493","type":"print"},{"value":"9783319079509","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07950-9_8","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T21:11:07Z","timestamp":1402434667000},"page":"100-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Normative Requirements for Business Process Compliance"],"prefix":"10.1007","author":[{"given":"Mustafa","family":"Hashmi","sequence":"first","affiliation":[]},{"given":"Guido","family":"Governatori","sequence":"additional","affiliation":[]},{"given":"Moe Thandar","family":"Wynn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,11]]},"reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s12599-011-0155-7","volume":"3","author":"R Accorsi","year":"2011","unstructured":"Accorsi, R., Lowis, L., Sato, Y.: Automated certification for compliant cloud-based business processes. Bus. Inf. Syst. Eng. 3(3), 145\u2013154 (2011)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"8_CR2","unstructured":"Tosatto, S.C., Governatori, G., Kelsen, P., van der Torre, L.: Business process compliance is hard. Technical report, NICTA (2012)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-17358-5_2","volume-title":"Service-Oriented Computing","author":"A Elgammal","year":"2010","unstructured":"Elgammal, A., Turetken, O., van den Heuvel, W.-J., Papazoglou, M.: Root-cause analysis of design-time compliance violations on the basis of property patterns. In: Maglio, P.P., Weske, M., Yang, J., Fantinato, M. (eds.) ICSOC 2010. LNCS, vol. 6470, pp. 17\u201331. Springer, Heidelberg (2010)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-642-19394-1_4","volume-title":"Service-Oriented Computing","author":"A Elgammal","year":"2011","unstructured":"Elgammal, A., Turetken, O., van den Heuvel, W.-J., Papazoglou, M.: On the formal specification of regulatory compliance: a comparative analysis. In: Maximilien, E.M., Rossi, G., Yuan, S.-T., Ludwig, H., Fantinato, M. (eds.) ICSOC 2010. LNCS, vol. 6568, pp. 27\u201338. Springer, Heidelberg (2011)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-642-04985-9_26","volume-title":"Rule Interchange and Applications","author":"TF Gordon","year":"2009","unstructured":"Gordon, T.F., Governatori, G., Rotolo, A.: Rules and norms: requirements for rule interchange languages in the legal domain. In: Governatori, G., Hall, J., Paschke, A. (eds.) RuleML 2009. LNCS, vol. 5858, pp. 282\u2013296. Springer, Heidelberg (2009)"},{"issue":"2\u20133","key":"8_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1142\/S0218843005001092","volume":"14","author":"G Governatori","year":"2005","unstructured":"Governatori, G.: Representing business contracts in RuleML. Int. J. Coop. Inf. Syst. 14(2\u20133), 181\u2013216 (2005)","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Governatori, G., Milosevic, Z.: Dealing with contract violations: formalism and domain specific language. In: EDOC 2005, pp. 46\u201357 (2005)","DOI":"10.1109\/EDOC.2005.13"},{"key":"8_CR8","unstructured":"Governatori, G., Rotolo, A.: A conceptually rich model of business process compliance. In: Proceeding of APCCM\u201910, vol. 110, pp. 3\u201312 (2010)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-642-16289-3_17","volume-title":"Semantic Web Rules","author":"G Governatori","year":"2010","unstructured":"Governatori, G., Rotolo, A.: Norm compliance in business process modeling. In: Dean, M., Hall, J., Rotolo, A., Tabet, S. (eds.) RuleML 2010. LNCS, vol. 6403, pp. 194\u2013209. Springer, Heidelberg (2010)"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"426","DOI":"10.4018\/978-1-60566-288-6.ch020","volume-title":"Handbook of Research on Business Process Management","author":"G Governatori","year":"2009","unstructured":"Governatori, G., Sadiq, S.: The journey to business process compliance. In: Cardoso, J., van der Aalst, W. (eds.) Handbook of Research on Business Process Management, pp. 426\u2013454. IGI Global, Hershey (2009)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-45140-4_29","volume-title":"Advanced Information Systems Engineering","author":"B Kiepuszewski","year":"2000","unstructured":"Kiepuszewski, B., ter Hofstede, A.H.M., Bussler, C.J.: On structured workflow modelling. In: Wangler, B., Bergman, L.D. (eds.) CAiSE 2000. LNCS, vol. 1789, pp. 431\u2013445. Springer, Heidelberg (2000)"},{"issue":"4","key":"8_CR12","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata, T.: Petri nets: properties, analysis and applications. Proc. IEEE 77(4), 541\u2013580 (1989)","journal-title":"Proc. IEEE"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-39406-8_2","volume-title":"Technologies for E-Services","author":"B Orri\u00ebns","year":"2003","unstructured":"Orri\u00ebns, B., Yang, J., Papazoglou, M.P.: A framework for business rule driven service composition. In: Benatallah, B., Shan, M.-C. (eds.) TES 2003. LNCS, vol. 2819, pp. 14\u201327. Springer, Heidelberg (2003)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-75183-0_12","volume-title":"Business Process Management","author":"W Sadiq","year":"2007","unstructured":"Sadiq, W., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149\u2013164. Springer, Heidelberg (2007)"},{"key":"8_CR15","unstructured":"Sartor, G.: Legal Reasoning: A Cognitive Approach to the Law. Springer, Dordrecht (2005)"},{"issue":"1","key":"8_CR16","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0218126698000043","volume":"8","author":"WMP van der Aalst","year":"1998","unstructured":"van der Aalst, W.M.P.: The application of petri nets to workflow management. J. Circuits Syst. Comput. 8(1), 21\u201366 (1998)","journal-title":"J. Circuits Syst. Comput."},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-45594-9_11","volume-title":"Business Process Management","author":"WMP van der Aalst","year":"2000","unstructured":"van der Aalst, W.M.P.: Workflow verification: finding control-flow errors using petri-net-based techniques. In: van der Aalst, W.M.P., Desel, J., Oberweis, A. (eds.) Business Process Management. LNCS, vol. 1806, p. 161. Springer, Heidelberg (2000)"},{"issue":"4","key":"8_CR18","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.is.2010.12.005","volume":"36","author":"H Weigand","year":"2011","unstructured":"Weigand, H., van den Heuvel, W.-J., Hiel, M.: Business policy compliance in service-oriented systems. Inf. Syst. 36(4), 791\u2013807 (2011)","journal-title":"Inf. Syst."}],"container-title":["Lecture Notes in Business Information Processing","Service Research and Innovation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07950-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:12:33Z","timestamp":1746263553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07950-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079493","9783319079509"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07950-9_8","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"11 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}