{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:10:32Z","timestamp":1751688632201,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319917030"},{"type":"electronic","value":"9783319917047"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91704-7_9","type":"book-chapter","created":{"date-parts":[[2018,5,15]],"date-time":"2018-05-15T09:59:05Z","timestamp":1526378345000},"page":"131-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["From Instance Spanning Models to Instance Spanning Rules"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Gall","sequence":"first","affiliation":[]},{"given":"Stefanie","family":"Rinderle-Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,16]]},"reference":[{"issue":"1","key":"9_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.jvlc.2010.11.002","volume":"22","author":"A Awad","year":"2011","unstructured":"Awad, A., Weidlich, M., Weske, M.: Visually specifying compliance rules and explaining their violations for business processes. J. Vis. Lang. Comput. 22(1), 30\u201355 (2011)","journal-title":"J. Vis. Lang. Comput."},{"key":"9_CR2","unstructured":"Awad, A.: BPMN-Q: a language to query business processes. In: Proceedings of EMISA 2007, pp. 115\u2013128 (2007)"},{"key":"9_CR3","unstructured":"Becker, J., Ahrendt, C., Coners, A., Wei\u00df, B., Winkelmann, A.: Business rule based extension of a semantic process modeling language for managing business process compliance in the financial sector. In: GI Jahrestagung (1), pp. 201\u2013206 (2010)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-319-45348-4_20","volume-title":"Business Process Management","author":"W Fdhila","year":"2016","unstructured":"Fdhila, W., Gall, M., Rinderle-Ma, S., Mangler, J., Indiono, C.: Classification and formalization of instance-spanning constraints in process-driven applications. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 348\u2013364. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45348-4_20"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Gall, M., Rinderle-Ma, S.: Visual modeling of instance-spanning constraints in process-aware information systems. In: Advanced Information Systems Engineering, pp. 597\u2013595, May 2017","DOI":"10.1007\/978-3-319-59536-8_37"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-540-74974-5_14","volume-title":"Service-Oriented Computing \u2013 ICSOC 2007","author":"A Ghose","year":"2007","unstructured":"Ghose, A., Koliadis, G.: Auditing business process compliance. In: Kr\u00e4mer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 169\u2013180. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74974-5_14"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Heinlein, C.: Workflow and process synchronization with interaction expressions and graphs. In: International Conference on Data Engineering, pp. 243\u2013252 (2001)","DOI":"10.1109\/ICDE.2001.914835"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-319-48472-3_22","volume-title":"On the Move to Meaningful Internet Systems: OTM 2016 Conferences","author":"C Indiono","year":"2016","unstructured":"Indiono, C., Mangler, J., Fdhila, W., Rinderle-Ma, S.: Rule-based runtime monitoring of instance-spanning constraints in process-aware information systems. In: Debruyne, C., Panetto, H., Meersman, R., Dillon, T., K\u00fchn, E., O\u2019Sullivan, D., Ardagna, C.A. (eds.) OTM 2016. LNCS, vol. 10033, pp. 381\u2013399. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48472-3_22"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1007\/978-3-642-35063-4_49","volume-title":"Web Information Systems Engineering - WISE 2012","author":"M Leitner","year":"2012","unstructured":"Leitner, M., Mangler, J., Rinderle-Ma, S.: Definition and enactment of instance-spanning process constraints. In: Wang, X.S., Cruz, I., Delis, A., Huang, G. (eds.) WISE 2012. LNCS, vol. 7651, pp. 652\u2013658. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35063-4_49"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.is.2015.02.007","volume":"54","author":"LT Ly","year":"2015","unstructured":"Ly, L.T., Maggi, F.M., Montali, M., Rinderle-Ma, S., van der Aalst, W.M.P.: Compliance monitoring in business processes: functionalities, application, and tool-support. Inf. Syst. 54, 209\u2013234 (2015)","journal-title":"Inf. Syst."},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-13094-6_3","volume-title":"Advanced Information Systems Engineering","author":"LT Ly","year":"2010","unstructured":"Ly, L.T., Rinderle-Ma, S., Dadam, P.: Design and verification of instantiable compliance rule graphs in process-aware information systems. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 9\u201323. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13094-6_3"},{"key":"9_CR12","unstructured":"Mangler, J., Rinderle-Ma, S.: IUPC: identification and unification of process constraints. CoRR abs\/1104.3609 (2011). http:\/\/arxiv.org\/abs\/1104.3609"},{"issue":"6","key":"9_CR13","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/TSE.2009.67","volume":"35","author":"D Moody","year":"2009","unstructured":"Moody, D.: The physics of notations: toward a scientific basis for constructing visual notations in software engineering. IEEE Trans. Softw. Eng. 35(6), 756\u2013779 (2009)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-662-45391-9_5","volume-title":"Service-Oriented Computing","author":"L Pufahl","year":"2014","unstructured":"Pufahl, L., Herzberg, N., Meyer, A., Weske, M.: Flexible batch configuration in business processes based on events. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 63\u201378. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45391-9_5"},{"key":"9_CR15","unstructured":"Rinderle-Ma, S., Gall, M., Fdhila, W., Mangler, J., Indiono, C.: Collecting examples for instance-spanning constraints. Technical report, CoRR abs\/1603.01523 (2016)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Warner, J., Atluri, V.: Inter-instance authorization constraints for secure workflow management. In: Symposium on Access Control Models and Technologies, pp. 190\u2013199 (2006)","DOI":"10.1145\/1133058.1133085"},{"key":"9_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"RJ Wieringa","year":"2014","unstructured":"Wieringa, R.J.: Design Science Methodology for Information Systems and Software Engineering. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43839-8"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Winter, K., Rinderle-Ma, S.: Discovering instance-spanning constraints from process execution logs based on classification techniques. In: 21st IEEE International Enterprise Distributed Object Computing Conference, pp. 79\u201388 (2017)","DOI":"10.1109\/EDOC.2017.20"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise, Business-Process and Information Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91704-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T14:55:23Z","timestamp":1751640923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91704-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319917030","9783319917047"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91704-7_9","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"16 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BPMDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Process Modeling, Development and Support","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bpmds2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.bpmds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}