{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:07:44Z","timestamp":1774915664385,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319211442","type":"print"},{"value":"9783319211459","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21145-9_14","type":"book-chapter","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T10:55:04Z","timestamp":1437044104000},"page":"221-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards Compliance Verification Between Global and Local Process Models"],"prefix":"10.1007","author":[{"given":"Pieter M.","family":"Kwantes","sequence":"first","affiliation":[]},{"given":"Pieter","family":"Van Gorp","sequence":"additional","affiliation":[]},{"given":"Jetty","family":"Kleijn","sequence":"additional","affiliation":[]},{"given":"Arend","family":"Rensink","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,17]]},"reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/3-540-45341-5_10","volume-title":"Advanced Information Systems Engineering","author":"WMP van der Aalst","year":"2001","unstructured":"van der Aalst, W.M.P., Weske, M.: The P2P approach to interorganizational workflows. In: Dittrich, K.R., Geppert, A., Norrie, M. (eds.) CAiSE 2001. LNCS, vol. 2068, pp. 140\u2013156. Springer, Heidelberg (2001). doi:10.1007\/3-540-45341-5_10"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-642-36926-1_24","volume-title":"Seminal Contributions to Information Systems Engineering: 25 Years of CAiSE","author":"WMP van der Aalst","year":"2013","unstructured":"van der Aalst, W.M.P., Weske, M.: Reflections on a decade of interorganizational workflow research. In: Bubenko, J., Krogstie, J., Pastor, O., Pernici, B., Rolland, C., S\u00f8lvberg, A. (eds.) Seminal Contributions to Information Systems Engineering: 25 Years of CAiSE, pp. 307\u2013313. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-36926-1_24"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-19440-5_24","volume-title":"Software Language Engineering","author":"N Bandener","year":"2011","unstructured":"Bandener, N., Soltenborn, C., Engels, G.: Extending DMM behavior specifications for visual execution and debugging. In: Malloy, B., Staab, S., van den Brand, M. (eds.) SLE 2010. LNCS, vol. 6563, pp. 357\u2013376. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-19440-5_24"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/11531371_70","volume-title":"Web Engineering","author":"M Brambilla","year":"2005","unstructured":"Brambilla, M., Deutsch, A., Sui, L., Vianu, V.: The role of visual tools in a web application design and verification framework: a visual notation for LTL formulae. In: Lowe, D.G., Gaedke, M. (eds.) ICWE 2005. LNCS, vol. 3579, pp. 557\u2013568. Springer, Heidelberg (2005). doi:10.1007\/11531371_70"},{"key":"14_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044450813-3\/50026-6","volume-title":"Model Checking","author":"EM Clarke","year":"2001","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (2001). http:\/\/books.google.de\/books?id=Nmc4wEaLXFEC"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-78238-4_22","volume-title":"Business Process Management Workshops","author":"G Decker","year":"2008","unstructured":"Decker, G., Barros, A.: Interaction modeling using BPMN. In: ter Hofstede, A.H.M., Benatallah, B., Paik, H.-Y. (eds.) BPM Workshops 2007. LNCS, vol. 4928, pp. 208\u2013219. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-78238-4_22"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-75183-0_22","volume-title":"Business Process Management","author":"G Decker","year":"2007","unstructured":"Decker, G., Weske, M.: Local enforceability in interaction petri nets. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 305\u2013319. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-75183-0_22"},{"key":"14_CR8","unstructured":"ECB: Target2securities. https:\/\/www.ecb.europa.eu\/paym\/t2s, Mar 2015"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Elgammal, A., Turetken, O., van den Heuvel, W.J., Papazoglou, M.: Formalizing and appling compliance patterns for business process compliance. Softw. Syst. Model., 1\u201328 (2014). http:\/\/dx.doi.org\/10.1007\/s10270-014-0395-3","DOI":"10.1007\/s10270-014-0395-3"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/TSC.2013.51","volume":"8","author":"R Eshuis","year":"2015","unstructured":"Eshuis, R., Norta, A., Kopp, O., Pitkanen, E.: Service outsourcing with process views. IEEE Trans. Serv. Comput. 8(1), 136\u2013154 (2015). http:\/\/doi.ieeecomputersociety.org\/10.1109\/TSC.2013.51","journal-title":"IEEE Trans. Serv. Comput."},{"key":"14_CR11","unstructured":"Fellmann, M., Zasada, A.: State-of-the-art of business process compliance approaches. In: 22st European Conference on Information Systems, ECIS 2014, Tel Aviv, Israel, 9\u201311 June 2014 (2014). http:\/\/aisel.aisnet.org\/ecis2014\/proceedings\/track06\/8"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Gabbay, D.M.: The declarative past and imperative future: executable temporal logic for interactive systems. In: Temporal Logic in Specification, Altrincham, UK, 8\u201310 April 1987, Proceedings, pp. 409\u2013448 (1987)","DOI":"10.1007\/3-540-51803-7_36"},{"issue":"1","key":"14_CR13","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10009-011-0186-x","volume":"14","author":"AH Ghamarian","year":"2012","unstructured":"Ghamarian, A.H., de Mol, M., Rensink, A., Zambon, E., Zimakova, M.: Modelling and analysis using GROOVE. STTT 14(1), 15\u201340 (2012). http:\/\/dx.doi.org\/10.1007\/s10009-011-0186-x","journal-title":"STTT"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.infsof.2012.08.014","volume":"55","author":"PV Gorp","year":"2013","unstructured":"Gorp, P.V., Dijkman, R.M.: A visual token-based formalization of BPMN 2.0 based on in-place transformations. Inf. Softw. Technol. 55(2), 365\u2013394 (2013). http:\/\/dx.doi.org\/10.1016\/j.infsof.2012.08.014","journal-title":"Inf. Softw. Technol."},{"key":"14_CR15","unstructured":"Hausmann, J.H.: Dynamic META modeling: a semantics description technique for visual modeling languages. Ph.D. thesis, University of Paderborn (2005). http:\/\/ubdata.uni-paderborn.de\/ediss\/17\/2005\/hausmann\/disserta.pdf"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-40176-3_12","volume-title":"Business Process Management","author":"D Knuplesch","year":"2013","unstructured":"Knuplesch, D., Reichert, M., Fdhila, W., Rinderle-Ma, S.: On enabling compliance of cross-organizational business processes. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 146\u2013154. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-40176-3_12"},{"key":"14_CR17","unstructured":"Kwantes, P.M.: Design of clearing and settlement operations: a case study in business process modelling and evaluation with petri nets. In: 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (CPN 2006) (2006)"},{"key":"14_CR18","first-page":"12","volume":"65","author":"A Martens","year":"2003","unstructured":"Martens, A.: On compatibility of web services. Petri Net Newsletter 65, 12\u201320 (2003)","journal-title":"Petri Net Newsletter"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Muram, F.U., Tran, H., Zdun, U.: Automated mapping of UML activity diagrams to formal specifications for supporting containment checking. In: Proceedings 11th International Workshop on Formal Engineering Approaches to Software Components and Architectures, FESCA 2014, Grenoble, France, 12th April 2014, pp. 93\u2013107 (2014), http:\/\/dx.doi.org\/10.4204\/EPTCS.147.7","DOI":"10.4204\/EPTCS.147.7"},{"key":"14_CR20","unstructured":"OMG: Business process model and notation (BPMN) version 2.0. Technical report, Jan 2011. http:\/\/taval.de\/publications\/BPMN20"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, Providence, Rhode Island, USA, 31 October - 1 November 1977, pp. 46\u201357 (1977). http:\/\/dx.doi.org\/10.1109\/SFCS.1977.32","DOI":"10.1109\/SFCS.1977.32"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/0304-3975(81)90110-9","volume":"13","author":"A Pnueli","year":"1981","unstructured":"Pnueli, A.: The temporal semantics of concurrent programs. Theor. Comput. Sci. 13, 45\u201360 (1981). doi:10.1016\/0304-3975(81)90110-9","journal-title":"Theor. Comput. Sci."},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-540-25959-6_40","volume-title":"Applications of Graph Transformations with Industrial Relevance","author":"A Rensink","year":"2004","unstructured":"Rensink, A.: The GROOVE simulator: a tool for state space generation. In: Pfaltz, J.L., Nagl, M., B\u00f6hlen, B. (eds.) AGTIVE 2003. LNCS, vol. 3062, pp. 479\u2013485. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-25959-6_40"},{"key":"14_CR24","unstructured":"SMPG: Securities markets practices group\/market practices and documents\/settlement and reconciliation. http:\/\/www.smpg.info, Mar 2015"},{"key":"14_CR25","unstructured":"S.W.I.F.T.: ISO15022 financial industry message scheme. http:\/\/www.iso15022.org, Mar 2015"},{"key":"14_CR26","unstructured":"S.W.I.F.T.: ISO20022 universal financial industry message scheme. http:\/\/www.iso20022.org, Mar 2015"}],"container-title":["Lecture Notes in Computer Science","Graph Transformation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21145-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T13:30:46Z","timestamp":1674567046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21145-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319211442","9783319211459"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21145-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}