{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:13Z","timestamp":1742914153197,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319394251"},{"type":"electronic","value":"9783319394268"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39426-8_23","type":"book-chapter","created":{"date-parts":[[2016,6,26]],"date-time":"2016-06-26T22:47:34Z","timestamp":1466981254000},"page":"289-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Usage Control Model Extension for the Verification of Security Policies in Artifact-Centric Business Process Models"],"prefix":"10.1007","author":[{"given":"\u00c1ngel Jes\u00fas","family":"Varela-Vaca","sequence":"first","affiliation":[]},{"given":"Diana","family":"Borrego","sequence":"additional","affiliation":[]},{"given":"Mar\u00eda Teresa","family":"G\u00f3mez-L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Rafael M.","family":"Gasca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,28]]},"reference":[{"key":"23_CR1","volume-title":"Business Process Management: Concepts, Languages, Architectures","author":"M Weske","year":"2007","unstructured":"Weske, M.: Business Process Management: Concepts, Languages, Architectures. Springer, New York (2007)"},{"issue":"3","key":"23_CR2","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1147\/sj.423.0428","volume":"42","author":"A Nigam","year":"2003","unstructured":"Nigam, A., Caswell, N.S.: Business artifacts: an approach to operational specification. IBM Syst. J. 42(3), 428\u2013445 (2003)","journal-title":"IBM Syst. J."},{"issue":"3","key":"23_CR3","first-page":"3","volume":"32","author":"D Cohn","year":"2009","unstructured":"Cohn, D., Hull, R.: Business artifacts: a data-centric approach to modeling business operations and processes. IEEE Data Eng. Bull. 32(3), 3\u20139 (2009)","journal-title":"IEEE Data Eng. Bull."},{"key":"23_CR4","unstructured":"OMG: Object Management Group, Business Process Model and Notation (BPMN) Version 2.0. OMG Standard (2011)"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.infsof.2015.02.010","volume":"62","author":"D Borrego","year":"2015","unstructured":"Borrego, D., Gasca, R.M., G\u00f3mez-L\u00f3pez, M.T.: Automating correctness verification of artifact-centric business process models. Inf. Softw. Technol. 62, 187\u2013197 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/978-3-540-88873-4_17","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"R Hull","year":"2008","unstructured":"Hull, R.: Artifact-centric business process models: brief survey of research results and challenges. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol. 5332, pp. 1152\u20131163. Springer, Heidelberg (2008)"},{"issue":"1","key":"23_CR7","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON ABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.is.2014.07.007","volume":"48","author":"MT G\u00f3mez-L\u00f3pez","year":"2015","unstructured":"G\u00f3mez-L\u00f3pez, M.T., Gasca, R.M., P\u00e9rez-\u00c1lvarez, J.M.: Compliance validation and diagnosis of business data constraints in business processes at runtime. Inf. Syst. 48, 26\u201343 (2015)","journal-title":"Inf. Syst."},{"issue":"1","key":"23_CR9","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.csi.2011.06.002","volume":"34","author":"M Chinosi","year":"2012","unstructured":"Chinosi, M., Trombetta, A.: BPMN: an introduction to the standard. Comput. Stand. Interfaces 34(1), 124\u2013134 (2012)","journal-title":"Comput. Stand. Interfaces"},{"key":"23_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30409-5","volume-title":"Enabling Flexibility in Process-Aware Information Systems - Challenges, Methods, Technologies","author":"M Reichert","year":"2012","unstructured":"Reichert, M., Weber, B.: Enabling Flexibility in Process-Aware Information Systems - Challenges, Methods, Technologies. Springer, Heidelberg (2012)"},{"issue":"3","key":"23_CR11","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.infsof.2013.12.004","volume":"56","author":"M Leitner","year":"2014","unstructured":"Leitner, M., Rinderle-Ma, S.: A systematic review on security in process-aware information systems - constitution challenges, and future directions. Inf. Softw. Technol. 56(3), 273\u2013293 (2014)","journal-title":"Inf. Softw. Technol."},{"key":"23_CR12","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-319-19237-6_16","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"M Salnitri","year":"2015","unstructured":"Salnitri, M., Brucker, A.D., Giorgini, P.: From secure business process models to secure artifact-centric specifications. In: Gaaloul, K., Schmidt, R., Nurcan, S., Guerreiro, S., Ma, Q. (eds.) BPMDS 2015 and EMMSAD 2015. LNBIP, vol. 214, pp. 246\u2013262. Springer, Heidelberg (2015)"},{"issue":"4","key":"23_CR13","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.sysarc.2008.10.002","volume":"55","author":"C Wolter","year":"2009","unstructured":"Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. J. Syst. Archit. 55(4), 211\u2013223 (2009)","journal-title":"J. Syst. Archit."},{"key":"23_CR14","series-title":"DuD-Fachbeitr\u00e4ge","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-663-05918-9_11","volume-title":"Verlssliche IT-Systeme 2001","author":"J J\u00fcrjens","year":"2001","unstructured":"J\u00fcrjens, J.: Developing secure systems with UMLsec \u2014 from business processes to implementation. In: Fox, D., K\u00f6hntopp, M., Pfitzmann, A. (eds.) Verlssliche IT-Systeme 2001. DuD-Fachbeitr\u00e4ge, pp. 151\u2013161. Springer, Verlag (2001)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Accorsi, R., Wonnemann, C., Stocker, T.: Towards forensic data flow analysis of business process logs. In: 2011 Sixth International Conference on IT Security Incident Management and IT Forensics, Institute of Electrical & Electronics Engineers (IEEE), May 2011","DOI":"10.1109\/IMF.2011.13"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Grompanopoulos, C., Mavridis, I.: Challenging issues of UCON in modern computing environments. In: Proceedings of the Fifth Balkan Conference in Informatics. BCI 2012, pp. 156\u2013161. ACM, New York (2012)","DOI":"10.1145\/2371316.2371346"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Gerede, C.E., Bhattacharya, K., Su, J.: Static analysis of business artifact-centric operational models. In: SOCA, pp. 133\u2013140. IEEE Computer Society (2007)","DOI":"10.1109\/SOCA.2007.42"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Deutsch, A., Hull, R., Patrizi, F., Vianu, V.: Automatic verification of data-centric business processes. In: ICDT, pp. 252\u2013267 (2009)","DOI":"10.1145\/1514894.1514924"},{"issue":"3","key":"23_CR19","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/2338626.2338628","volume":"37","author":"E Damaggio","year":"2012","unstructured":"Damaggio, E., Deutsch, A., Vianu, V.: Artifact systems with data dependencies and arithmetic. ACM Trans. Database Syst. 37(3), 22 (2012)","journal-title":"ACM Trans. Database Syst."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Gonzalez, P., Griesmayer, A., Lomuscio, A.: Verifying GSM-based business artifacts. In: Goble, C.A., Chen, P.P., Zhang, J. (eds.) ICWS, pp. 25\u201332. IEEE Computer Society (2012)","DOI":"10.1109\/ICWS.2012.31"},{"key":"23_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-34321-6_2","volume-title":"Service-Oriented Computing","author":"F Belardinelli","year":"2012","unstructured":"Belardinelli, F., Lomuscio, A., Patrizi, F.: Verification of GSM-based artifact-centric systems through finite abstraction. In: Liu, C., Ludwig, H., Toumani, F., Yu, Q. (eds.) Service Oriented Computing. LNCS, vol. 7636, pp. 17\u201331. Springer, Heidelberg (2012)"},{"key":"23_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-23059-2_11","volume-title":"Business Process Management","author":"N Lohmann","year":"2011","unstructured":"Lohmann, N.: Compliance by design for artifact-centric business processes. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 99\u2013115. Springer, Heidelberg (2011)"},{"key":"23_CR23","unstructured":"Meyer, A., Polyvyanyy, A., Weske, M.: Weak conformance of process models with respect to data objects. In: Proceedings of the \n                    \n                      \n                    \n                    $$4^{\\text{th}}$$\n                    \n                      \n                        \n                          \n                            4\n                            \n                              th\n                            \n                          \n                        \n                      \n                    \n                   Central-European Workshop on Services and their Composition, ZEUS-2012, Bamberg, pp. 74\u201380, 23\u201324 February 2012"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39426-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T05:17:55Z","timestamp":1558502275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39426-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319394251","9783319394268"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39426-8_23","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"28 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}