{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T15:06:03Z","timestamp":1760799963597},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319453477"},{"type":"electronic","value":"9783319453484"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45348-4_20","type":"book-chapter","created":{"date-parts":[[2016,9,7]],"date-time":"2016-09-07T12:06:15Z","timestamp":1473249975000},"page":"348-364","source":"Crossref","is-referenced-by-count":26,"title":["Classification and Formalization of Instance-Spanning Constraints in Process-Driven Applications"],"prefix":"10.1007","author":[{"given":"Walid","family":"Fdhila","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Gall","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Rinderle-Ma","sequence":"additional","affiliation":[]},{"given":"Juergen","family":"Mangler","sequence":"additional","affiliation":[]},{"given":"Conrad","family":"Indiono","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,8]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139195881","volume-title":"Modeling in Event-B: System and Software Engineering","author":"JR Abrial","year":"2010","unstructured":"Abrial, J.R.: Modeling in Event-B: System and Software Engineering, 1st edn. Cambridge University Press, New York (2010)","edition":"1"},{"key":"20_CR2","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/978-3-642-12814-1_10","volume-title":"Business Information Systems","author":"A Awad","year":"2010","unstructured":"Awad, A., Weidlich, M., Weske, M.: Consistency checking of compliance rules. In: Abramowicz, W., Tolksdorf, R. (eds.) BIS 2010. LNBIP, vol. 47, pp. 106\u2013118. Springer, Heidelberg (2010)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Boubaker, S., Gaaloul, W., Graiet, M., Hadj-Alouane, N.B.: Event-b based approach for verifying cloud resource allocation in business process. In: International Conference on Services Computing, pp. 538\u2013545 (2015)","DOI":"10.1109\/SCC.2015.79"},{"key":"20_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/978-3-319-06257-0_24","volume-title":"Business Process Management Workshops","author":"C Cabanillas","year":"2014","unstructured":"Cabanillas, C., Baumgrass, A., Mendling, J., Rogetzer, P., Bellovoda, B.: Towards the enhancement of business process monitoring for complex logistics chains. In: Lohmann, N., Song, M., Wohed, P. (eds.) BPM 2013 Workshops. LNBIP, vol. 171, pp. 305\u2013317. Springer, Heidelberg (2014)"},{"issue":"2","key":"20_CR5","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/0022-0000(79)90046-1","volume":"18","author":"MJ Fischer","year":"1979","unstructured":"Fischer, M.J., Ladner, R.E.: Propositional dynamic logic of regular programs. J. Comput. Syst. Sci. 18(2), 194\u2013211 (1979)","journal-title":"J. Comput. Syst. Sci."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Ghose, A., Koliadis, G.: Auditing business process compliance. In: International Conference on Service-Oriented Computing, pp. 169\u2013180 (2007)","DOI":"10.1007\/978-3-540-74974-5_14"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Heinlein, C.: Workflow and process synchronization with interaction expressions and graphs. In: International Conference on Data Engineering, pp. 243\u2013252 (2001)","DOI":"10.1109\/ICDE.2001.914835"},{"key":"20_CR8","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/978-3-319-02922-1_2","volume-title":"Asia Pacific Business Process Management","author":"AHM Hofstede ter","year":"2013","unstructured":"ter Hofstede, A.H.M., Ouyang, C., La Rosa, M., Song, L., Wang, J., Polyvyanyy, A.: APQL: a process-model query language. In: Song, M., Wynn, M.T., Liu, J. (eds.) AP-BPM 2013. LNBIP, vol. 159, pp. 23\u201338. Springer, Heidelberg (2013)"},{"issue":"2","key":"20_CR9","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1023\/A:1022969405325","volume":"22","author":"R Joshi","year":"2003","unstructured":"Joshi, R., Lamport, L., Matthews, J., Tasiran, S., Tuttle, M., Yu, Y.: Checking cache-coherence protocols with TLA $$+$$ . Form. Methods Syst. Des. 22(2), 125\u2013131 (2003)","journal-title":"Form. Methods Syst. Des."},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Kaes, G., RinderleMa, S., Vigne, R., Mangler, J.: Flexibility requirements in real-world process scenarios and prototypical realization in the care domain. In: OTM Workshops, pp. 55\u201364 (2014)","DOI":"10.1007\/978-3-662-45550-0_8"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Knuplesch, D., Reichert, M., Kumar, A.: Visually monitoring multiple perspectives of business process compliance. In: International Conference on Business Process Management, pp. 263\u2013279 (2015)","DOI":"10.1007\/978-3-319-23063-4_19"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Kowalski, R., Sergot, M.: A logic-based calculus of events. New Gener. Comput. 4(1), 67\u201395","DOI":"10.1007\/BF03037383"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Leitner, M., Mangler, J., Rinderle-Ma, S.: Definition and enactment of instance-spanning process constraints. In: International Conference on Web Information Systems Engineering, pp. 652\u2013658 (2012)","DOI":"10.1007\/978-3-642-35063-4_49"},{"issue":"3","key":"20_CR14","first-page":"293","volume":"9","author":"G Lenzi","year":"2005","unstructured":"Lenzi, G.: The modal $$\\mu $$ -calculus: a survey. Task Q. 9(3), 293\u2013316 (2005)","journal-title":"Task Q."},{"key":"20_CR15","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.is.2015.02.007","volume":"54","author":"LT Ly","year":"2015","unstructured":"Ly, L.T., Maggi, F.M., Montali, M., Rinderle-Ma, S., van der Aalst, W.M.P.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209\u2013234 (2015)","journal-title":"Inf. Syst."},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1007\/978-3-642-23059-2_13","volume-title":"Business Process Management","author":"FM Maggi","year":"2011","unstructured":"Maggi, F.M., Montali, M., Westergaard, M., van der Aalst, W.: Monitoring business constraints with linear temporal logic: an approach based on colored automata. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 132\u2013147. Springer, Heidelberg (2011)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Mangler, J., Rinderle-Ma, S.: Rule-based synchronization of process activities. In: Commerce and Enterprise Computing, pp. 121\u2013128 (2011)","DOI":"10.1109\/CEC.2011.23"},{"key":"20_CR18","unstructured":"Mangler, J., Rinderle-Ma, S.: IUPC: identification and unification of process constraints. CoRR abs\/1104.3609 (2011). http:\/\/arxiv.org\/abs\/1104.3609"},{"issue":"26","key":"20_CR19","doi-asserted-by":"crossref","first-page":"2854","DOI":"10.1016\/j.tcs.2010.05.009","volume":"412","author":"R Mateescu","year":"2011","unstructured":"Mateescu, R., Monteiro, P.T., Dumas, E., de Jong, H.: Ctrl: extension of CTL with regular expressions and fairness operators to verify genetic regulatory networks. Theoret. Comput. Sci. 412(26), 2854\u20132883 (2011)","journal-title":"Theoret. Comput. Sci."},{"issue":"1","key":"20_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2542182.2542199","volume":"5","author":"M Montali","year":"2014","unstructured":"Montali, M., Maggi, F.M., Chesani, F., Mello, P., van der Aalst, W.M.P.: Monitoring business constraints with the event calculus. ACM Trans. Intell. Syst. Technol. 5(1), 1\u201330 (2014)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"20_CR21","volume-title":"Commonsense Reasoning: An Event Calculus Based Approach","author":"ET Mueller","year":"2006","unstructured":"Mueller, E.T.: Commonsense Reasoning: An Event Calculus Based Approach. Morgan Kaufmann, Burlington (2006)"},{"issue":"3","key":"20_CR22","doi-asserted-by":"crossref","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","volume":"24","author":"K Peffers","year":"2007","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45\u201377 (2007)","journal-title":"J. Manag. Inf. Syst."},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Pflug, J., Rinderle-Ma, S.: Dynamic instance queuing in process-aware information systems. In: Symposium on Applied Computing, pp. 1426\u20131433 (2013)","DOI":"10.1145\/2480362.2480629"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: Annual Symposium on Foundations of Computer Science, pp. 46\u201357 (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-662-45391-9_5","volume-title":"Service-Oriented Computing","author":"L Pufahl","year":"2014","unstructured":"Pufahl, L., Herzberg, N., Meyer, A., Weske, M.: Flexible batch configuration in business processes based on events. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 63\u201378. Springer, Heidelberg (2014)"},{"key":"20_CR26","unstructured":"Rinderle-Ma, S., Gall, M., Fdhila, W., Mangler, J., Indiono, C.: Collecting examples for instance-spanning constraints. Technical report, arXiv:1603.01523 (2016)"},{"key":"20_CR27","unstructured":"Rinderle-Ma, S., Mangler, J.: Integration of process constraints from heterogeneous sources in process-aware information systems. In: International Workshop on Enterprise Modelling and Information Systems Architectures, pp. 51\u201364 (2011)"},{"issue":"2","key":"20_CR28","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s10257-008-0081-5","volume":"7","author":"M Rouached","year":"2008","unstructured":"Rouached, M., Fdhila, W., Godart, C.: A semantical framework to engineering WSBPEL processes. Inf. Syst. e-Bus. Manag. 7(2), 223\u2013250 (2008)","journal-title":"Inf. Syst. e-Bus. Manag."},{"key":"20_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-540-75183-0_12","volume-title":"Business Process Management","author":"W Sadiq","year":"2007","unstructured":"Sadiq, W., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149\u2013164. Springer, Heidelberg (2007)"},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/978-3-319-07881-6_4","volume-title":"Advanced Information Systems Engineering","author":"A Senderovich","year":"2014","unstructured":"Senderovich, A., Weidlich, M., Gal, A., Mandelbaum, A.: Queue mining \u2013 predicting delays in service processes. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 42\u201357. Springer, Heidelberg (2014)"},{"issue":"27","key":"20_CR31","first-page":"34","volume":"38","author":"S Ulfelder","year":"2014","unstructured":"Ulfelder, S.: Building a compliance framework. Compt. World 38(27), 34\u201335 (2014)","journal-title":"Compt. World"},{"key":"20_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-45319-9_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"MY Vardi","year":"2001","unstructured":"Vardi, M.Y.: Branching vs. linear time: final showdown. In: Margaria, T., Yi, W. (eds.) TACAS 2001. LNCS, vol. 2031, p. 1. Springer, Heidelberg (2001)"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Warner, J., Atluri, V.: Inter-instance authorization constraints for secure workflow management. In: Symposium on Access Control Models and Technologies, pp. 190\u2013199 (2006)","DOI":"10.1145\/1133058.1133085"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45348-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T03:39:57Z","timestamp":1568345997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45348-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319453477","9783319453484"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45348-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}