{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:24Z","timestamp":1740099084384,"version":"3.37.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319951706"},{"type":"electronic","value":"9783319951713"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95171-3_40","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T15:49:47Z","timestamp":1530632987000},"page":"511-526","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Specifying and Incorporating Compliance Requirements into Software Development Using UML and OCL"],"prefix":"10.1007","author":[{"given":"Oluwasefunmi Tale","family":"Arogundade","sequence":"first","affiliation":[]},{"given":"Temitope Elizabeth","family":"Abioye","sequence":"additional","affiliation":[]},{"given":"Abiodun Muyideen","family":"Mustapha","sequence":"additional","affiliation":[]},{"given":"Adeola Mary","family":"Adeniji","sequence":"additional","affiliation":[]},{"given":"Abiodun Motunrayo","family":"Ikotun","sequence":"additional","affiliation":[]},{"given":"Franklin O.","family":"Asahiah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"issue":"1","key":"40_CR1","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10270-014-0395-3","volume":"15","author":"A Elgammal","year":"2016","unstructured":"Elgammal, A., Turetken, O., van den Heuvel, W., Papazoglou, M.: Formalizing and applying compliance patterns for business process compliance. Softw. Syst. Model. 15(1), 119\u2013146 (2016)","journal-title":"Softw. Syst. Model."},{"key":"40_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-75183-0_12","volume-title":"Business Process Management","author":"S Sadiq","year":"2007","unstructured":"Sadiq, S., Governatori, G., Namiri, K.: Modeling control objectives for business process compliance. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 149\u2013164. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-75183-0_12"},{"key":"40_CR3","unstructured":"Abdullah, N.S., Indulska, M., Sadiq, S.: A study of compliance management in information system research. In: 17th European Conference on Information Systems (ECIS 2009 Proceedings), Verona, Italy, vol. 9 (2009)"},{"key":"40_CR4","unstructured":"Deloitte: Compliance Risk Assessments: The Third Ingredient in a World-Class Ethics and Compliance Program. Deloitte Development LLC, USA (2015)"},{"issue":"2","key":"40_CR5","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF01277643","volume":"3","author":"D Georgakopoulous","year":"1995","unstructured":"Georgakopoulous, D., Hornick, M., Sheth, A.: An overview of workflow management: from process modelling to workflow automation infrastructure. Distrib. Parallel Databases 3(2), 119\u2013153 (1995)","journal-title":"Distrib. Parallel Databases"},{"key":"40_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-22555-0_33","volume-title":"Advances in Computing and Information Technology","author":"J Gupta","year":"2011","unstructured":"Gupta, J., Gosain, A., Nagpal, S.: Empirical validation of object oriented data warehouse design quality metrics. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds.) ACITY 2011. CCIS, vol. 198, pp. 320\u2013329. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-22555-0_33"},{"key":"40_CR7","unstructured":"Lisboa-Filho, J., Sampaio, G.B., Nalon, F.R., Borges, K.A.D.V.: A UML profile for conceptual modeling in GIS domain. In: Proceedings of the International Workshop on Domain Engineering at CAiSE 2010, Hammamet, Tunisia, pp. 18\u201331 (2010)"},{"issue":"2","key":"40_CR8","first-page":"375","volume":"8","author":"HK Kim","year":"2014","unstructured":"Kim, H.K., Hyun, Y.: Design for U- health care hybrid control systems. Int. J. Softw. Eng. Appl. 8(2), 375\u2013384 (2014)","journal-title":"Int. J. Softw. Eng. Appl."},{"issue":"1","key":"40_CR9","first-page":"157","volume":"5","author":"L Sunguk","year":"2012","unstructured":"Sunguk, L.: UML for database systems and computer application. Int. J. Database Theor. Appl. 5(1), 157\u2013164 (2012)","journal-title":"Int. J. Database Theor. Appl."},{"issue":"2","key":"40_CR10","first-page":"59","volume":"3","author":"A Kaur","year":"2012","unstructured":"Kaur, A., Arora, R.: Application of UML in real-time embedded systems. Int. J. Softw. Eng. Appl. (IJSEA) 3(2), 59\u201370 (2012)","journal-title":"Int. J. Softw. Eng. Appl. (IJSEA)"},{"key":"40_CR11","first-page":"231","volume":"4","author":"F Alhumaidan","year":"2012","unstructured":"Alhumaidan, F.: A Critical Analysis and treatment of important UML diagrams enhancing Modelling point. Intell. Inf. Manag. 4, 231\u2013237 (2012)","journal-title":"Intell. Inf. Manag."},{"issue":"1","key":"40_CR12","first-page":"1783","volume":"1","author":"A Jakimi","year":"2009","unstructured":"Jakimi, A., El Koutbi, M.: An object-oriented approach to UML scenarios engineering and code generation. Int. J. Comput. Theor. Eng. 1(1), 1783\u20138201 (2009)","journal-title":"Int. J. Comput. Theor. Eng."},{"key":"40_CR13","unstructured":"Pham, T., Le Thanh, N.: Checking the compliance of business process in business process life cycle. In: 10th International Web Rule Symposium (RuleML 2016), CEUR 1620, New York, United States (2016)"},{"key":"40_CR14","unstructured":"Gottingen: Computer Science and Information System Reports. Technical reports, University of Jyv\u00e4skyl\u00e4, Finland (2010)"},{"key":"40_CR15","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-540-89218-2_14","volume-title":"The Practice of Enterprise Modeling PoEM 2008","author":"L Nemuraite","year":"2008","unstructured":"Nemuraite, L., Ceponiene, L., Vedrickas, G.: Representation of business rules in UML&OCL models for developing information systems. In: Stirna, J., Persson, A. (eds.) The Practice of Enterprise Modeling PoEM 2008. LNBIP, vol. 15, pp. 182\u2013196. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-89218-2_14"},{"issue":"3","key":"40_CR16","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s10009-004-0166-5","volume":"7","author":"R Bubel","year":"2005","unstructured":"Bubel, R., Hahnle, R.: Integration of informal and formal development of object-oriented safety-critical software: a case study with the key system. Int. J. Tools Softw. Transf. 7(3), 197\u2013211 (2005)","journal-title":"Int. J. Tools Softw. Transf."},{"key":"40_CR17","volume-title":"Software Specification and Testing Using UML and OCL","author":"J Milley","year":"2005","unstructured":"Milley, J., Peters, D.K.: Software Specification and Testing Using UML and OCL. Faculty of Engineering and Applied Science MUN St. John\u2019s, Newfoundland (2005)"},{"key":"40_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-540-24626-8_21","volume-title":"Radical Innovations of Software and Systems Engineering in the Future","author":"B Rumpe","year":"2004","unstructured":"Rumpe, B.: Agile modeling with the UML. In: Wirsing, M., Knapp, A., Balsamo, S. (eds.) RISSEF 2002. LNCS, vol. 2941, pp. 297\u2013309. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24626-8_21"},{"key":"40_CR19","volume-title":"Business Modeling with UML","author":"H Eriksson","year":"2000","unstructured":"Eriksson, H., Penker, M.: Business Modeling with UML, 1st edn. Wiley, New York (2000)","edition":"1"},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Petre, M.: UML in practice. In: Proceedings of the 2013 International Conference on Software Engineering, ICSE 2013, pp. 722\u2013731. ACM Digital Library, San Francisco (2013)","DOI":"10.1109\/ICSE.2013.6606618"},{"key":"40_CR21","volume-title":"System Analysis and Design","author":"A Dennis","year":"2012","unstructured":"Dennis, A., Wixom, B.A., Roth, R.M.: System Analysis and Design, 5th edn. Wiley, New York (2012)","edition":"5"},{"issue":"4","key":"40_CR22","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.infsof.2010.11.006","volume":"53","author":"CH Chang","year":"2011","unstructured":"Chang, C.H., Lu, C.W., Hsiung, P.A.: Pattern-based framework for modularized software development and evolution robustness. Inf. Softw. Technol. 53(4), 307\u2013316 (2011)","journal-title":"Inf. Softw. Technol."},{"key":"40_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/11555827_5","volume-title":"Computer Security \u2013 ESORICS 2005","author":"K Sohr","year":"2005","unstructured":"Sohr, K., Ahn, G.-J., Gogolla, M., Migge, L.: Specification and validation of authorisation constraints using UML and OCL. In: di Vimercati, SdC, Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 64\u201379. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11555827_5"},{"key":"40_CR24","volume-title":"Law of Consumer Protection","author":"FN Monye","year":"2003","unstructured":"Monye, F.N.: Law of Consumer Protection, 1st edn. Spectrum Books, Ibadan (2003)","edition":"1"},{"issue":"5","key":"40_CR25","first-page":"14","volume":"1","author":"RG Pollit","year":"1990","unstructured":"Pollit, R.G.: Standards Organisation of Nigeria (SON). SON J. 1(5), 14 (1990)","journal-title":"SON J."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95171-3_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T16:20:37Z","timestamp":1530634837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95171-3_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319951706","9783319951713"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95171-3_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}