{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:28:51Z","timestamp":1767338931972,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319915623"},{"type":"electronic","value":"9783319915630"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91563-0_20","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T05:53:18Z","timestamp":1526449998000},"page":"327-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["DMN Decision Execution on the Ethereum Blockchain"],"prefix":"10.1007","author":[{"given":"Stephan","family":"Haarmann","sequence":"first","affiliation":[]},{"given":"Kimon","family":"Batoulis","sequence":"additional","affiliation":[]},{"given":"Adriatik","family":"Nikaj","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Weske","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28616-2","volume-title":"Business Process Management - Concepts, Languages, Architectures","author":"M Weske","year":"2012","unstructured":"Weske, M.: Business Process Management - Concepts, Languages, Architectures, 2nd edn. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28616-2","edition":"2"},{"unstructured":"OMG: Business process model and notation, specification 2.0. Version 2 (2011)","key":"20_CR2"},{"unstructured":"OMG: Decision model and notation, specification 1.1. Version 1.1 (2016)","key":"20_CR3"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-319-19069-3_22","volume-title":"Advanced Information Systems Engineering","author":"K Batoulis","year":"2015","unstructured":"Batoulis, K., Meyer, A., Bazhenova, E., Decker, G., Weske, M.: Extracting decision logic from process models. In: Zdravkovic, J., Kirikova, M., Johannesson, P. (eds.) CAiSE 2015. LNCS, vol. 9097, pp. 349\u2013366. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19069-3_22"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/3-540-45341-5_10","volume-title":"Advanced Information Systems Engineering","author":"WMP van der Aalst","year":"2001","unstructured":"van der Aalst, W.M.P., Weske, M.: The P2P approach to interorganizational workflows. In: Dittrich, K.R., Geppert, A., Norrie, M.C. (eds.) CAiSE 2001. LNCS, vol. 2068, pp. 140\u2013156. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45341-5_10"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-45348-4_19","volume-title":"Business Process Management","author":"I Weber","year":"2016","unstructured":"Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A., Mendling, J.: Untrusted business process monitoring and execution using blockchain. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 329\u2013347. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45348-4_19"},{"key":"20_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6","volume-title":"Introducing Ethereum and Solidity","author":"C Dannen","year":"2017","unstructured":"Dannen, C.: Introducing Ethereum and Solidity. Apress, Berkeley (2017). https:\/\/doi.org\/10.1007\/978-1-4842-2535-6"},{"unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)","key":"20_CR8"},{"issue":"3","key":"20_CR9","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","volume":"18","author":"F Tschorsch","year":"2016","unstructured":"Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084\u20132123 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"20_CR10","volume-title":"Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction","author":"A Narayanan","year":"2016","unstructured":"Narayanan, A., Bonneau, J., Felten, E.W., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction. Princeton University Press, Princeton (2016)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-59536-8_3","volume-title":"Advanced Information Systems Engineering","author":"J de Kruijff","year":"2017","unstructured":"de Kruijff, J., Weigand, H.: Understanding the blockchain using enterprise ontology. In: Dubois, E., Pohl, K. (eds.) CAiSE 2017. LNCS, vol. 10253, pp. 29\u201343. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59536-8_3"},{"unstructured":"Mendling, J., Weber, I., et al.: Blockchains for business process management - challenges and opportunities. CoRR abs\/1704.03610 (2017)","key":"20_CR12"},{"unstructured":"Prybila, C., Schulte, S., Hochreiner, C., Weber, I.: Runtime verification for business processes utilizing the bitcoin blockchain. CoRR abs\/1706.04404 (2017)","key":"20_CR13"},{"unstructured":"L\u00f3pez-Pintado, O., Garc\u00eda-Ba\u00f1uelos, L., Dumas, M., Weber, I.: Caterpillar: a blockchain-based business process management system. In: Proceedings of the BPM Demo Track and BPM Dissertation Award Co-Located with 15th International Conference on Business Process Modeling (BPM 2017), Barcelona, Spain, 13 September 2017 (2017)","key":"20_CR14"},{"doi-asserted-by":"crossref","unstructured":"Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997)","key":"20_CR15","DOI":"10.5210\/fm.v2i9.548"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-26896-5_7","volume-title":"The Future of Law and eTechnologies","author":"M K\u00f5lvart","year":"2016","unstructured":"K\u00f5lvart, M., Poola, M., Rull, A.: Smart contracts. In: Kerikm\u00e4e, T., Rull, A. (eds.) The Future of Law and eTechnologies, pp. 133\u2013147. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-26896-5_7"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-319-42019-6_11","volume-title":"Rule Technologies. Research, Tools, and Applications","author":"F Idelberger","year":"2016","unstructured":"Idelberger, F., Governatori, G., Riveret, R., Sartor, G.: Evaluation of logic-based smart contracts for blockchain systems. In: Alferes, J.J.J., Bertossi, L., Governatori, G., Fodor, P., Roman, D. (eds.) RuleML 2016. LNCS, vol. 9718, pp. 167\u2013183. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42019-6_11"},{"key":"20_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","volume-title":"Principles of Security and Trust","author":"N Atzei","year":"2017","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A Survey of Attacks on Ethereum Smart Contracts (SoK). In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 164\u2013186. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54455-6_8"},{"unstructured":"Buterin, V.: Secret sharing DAOs: the other crypto 2.0 (2014)","key":"20_CR19"},{"doi-asserted-by":"crossref","unstructured":"Kosba, A.E., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, 22\u201326 May 2016, pp. 839\u2013858 (2016)","key":"20_CR20","DOI":"10.1109\/SP.2016.55"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91563-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:37:40Z","timestamp":1710268660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91563-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319915623","9783319915630"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91563-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/caise2018.ut.ee","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}