{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:40:15Z","timestamp":1767138015486,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319115603","type":"print"},{"value":"9783319115610","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11561-0_3","type":"book-chapter","created":{"date-parts":[[2014,9,11]],"date-time":"2014-09-11T10:16:53Z","timestamp":1410430613000},"page":"36-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes"],"prefix":"10.1007","author":[{"given":"Thorsten","family":"Humberg","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Wessel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Poggenpohl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sven","family":"Wenzel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Ruhroth","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan","family":"J\u00fcrjens","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,9,12]]},"reference":[{"key":"3_CR1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: BSI-Grundschutz Katalog (2006)"},{"issue":"5","key":"3_CR2","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.is.2006.05.003","volume":"32","author":"W van der Aalst","year":"2007","unstructured":"van der Aalst, W., Reijers, H., Weijters, A., Vandongen, B., Alvesdemedeiros, A., Song, M., Verbeek, H.: Business process mining: an industrial application. Inf. Syst. 32(5), 713\u2013732 (2007)","journal-title":"Inf. Syst."},{"key":"3_CR3","unstructured":"W3C OWL Working Group: OWL 2 Web Ontology Language: Document Overview (Second Edition). W3C Recommendation, 11 December 2012. http:\/\/www.w3.org\/TR\/owl2-overview\/"},{"key":"3_CR4","volume-title":"The Description Logic Handbook: Theory, Implementation, and Applications","year":"2003","unstructured":"Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.): The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, New York (2003)"},{"key":"3_CR5","unstructured":"ISO\/IEC: ISO27001: Information Security Management System (ISMS) standard, October 2005. http:\/\/www.27000.org\/iso-27001.htm"},{"key":"3_CR6","unstructured":"Bundesanstalt f\u00fcr Finanzdienstleistungsaufsicht: Mindestanforderungen an das Risikomanagement - MaRisk, October 2012"},{"key":"3_CR7","unstructured":"Bundesrepublik Deutschland, vertreten durch das Bundesministerium der Justiz.: Bundesdatenschutzgesetz, December 1990"},{"key":"3_CR8","unstructured":"Bundesrepublik Deutschland, vertreten durch das Bundesministerium der Justiz.: B\u00fcrgerliches Gesetzbuch, August 1896"},{"key":"3_CR9","unstructured":"SecVolution Webpage: http:\/\/www-secse.cs.tu-dortmund.de\/secse\/pages\/research\/projects\/SecVolution"},{"key":"3_CR10","unstructured":"J\u00fcrjens, J., Schneider, K.: Beyond one-shot security. In: Modelling and Quality in Requirements Engineering (Essays Dedicated to Martin Glinz on the Occasion of His 60th Birthday), Verlagshaus Monsenstein und Vannerdat, pp. 131\u2013141 (2012)"},{"key":"3_CR11","unstructured":"Wolter, C., Menzel, M., Meinel, C.: Modelling security goals in business processes. In: Modellierung (2008)"},{"key":"3_CR12","unstructured":"Dixon, J., Jones, T.: Hype cycle for business process management. Technical report, Gartner Study (2011)"},{"key":"3_CR13","unstructured":"BITKOM: Cloud-Computing - Evolution in der Technik. Technical report, BITKOM (2009)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: ARES (2009)","DOI":"10.1109\/ARES.2009.90"},{"key":"3_CR15","unstructured":"Gr\u00e4uler, M., Martens, B.; Teuteberg, F.: IT-Sicherheitsmanagement im Cloud Computing - Entwicklung und Implementierung einer Ontologie. In: Proceedings zur INFORMATIK 2011 (2011)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Tsoumas, B., Gritzalis, D.: Towards an ontology-based security management. In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA), vol. 1, pp. 985\u2013992. IEEE (2006)","DOI":"10.1109\/AINA.2006.329"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS ), p. 183. ACM Press, New York (2009)","DOI":"10.1145\/1533057.1533084"},{"key":"3_CR18","unstructured":"Peschke, M., Hirsch, M., J\u00fcrjens, J., Braun, S.: Werkzeuggest\u00fctzte Identifikation von IT-Sicherheitsrisiken. In: D-A-CH Security 2011 (2011)"},{"key":"3_CR19","doi-asserted-by":"publisher","unstructured":"Schneider, K., Knauss, E., Houmb, S., Islam, S., J\u00fcrjens, J.: Enhancing security requirements engineering by organizational learning. Requirements Eng., 1\u201322 (2011). doi:10.1007\/s00766-011-0141-0","DOI":"10.1007\/s00766-011-0141-0"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Knauss, E., Lubke, D., Meyer, S.: Feedback-driven requirements engineering: the heuristic requirements assistant. In: Proceedings of the 31st International Conference on Software Engineering, ICSE \u201909, pp. 587\u2013590. IEEE Computer Society, Washington, DC (2009)","DOI":"10.1109\/ICSE.2009.5070562"},{"key":"3_CR21","unstructured":"ISO\/IEC: ISO27005: Information technology - Security techniques - Information security risk management, June 2008. http:\/\/www.27000.org\/iso-27005.htm"},{"key":"3_CR22","unstructured":"NIST, Aroms, E.: NIST Special Publication 800\u201339 Managing Information Security Risk. CreateSpace, Paramount, CA (2012)"}],"container-title":["Communications in Computer and Information Science","Cloud Computing and Services Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11561-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T12:25:27Z","timestamp":1712060727000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11561-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115603","9783319115610"],"references-count":22,"aliases":["10.1007\/978-3-319-14224-1_3"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11561-0_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"12 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}