{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T07:19:13Z","timestamp":1744183153042},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540759744"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75975-1_4","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T01:40:55Z","timestamp":1195004455000},"page":"39-52","source":"Crossref","is-referenced-by-count":17,"title":["Specifying Process-Aware Access Control Rules in SBVR"],"prefix":"10.1007","author":[{"given":"Stijn","family":"Goedertier","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Mues","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Vanthienen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Securities and Exchange Commission, U.S.A.: Sarbanes Oxley Act 2002. Securities and Exchange Commission (SEC), U.S.A (2002)"},{"key":"4_CR2","unstructured":"Object Management Group: Business Process Modeling Notation (BPMN) \u2013 final adopted specification. OMG Document \u2013 dtc\/06-02-01 (2006)"},{"key":"4_CR3","unstructured":"Chapin, D.: Semantics of Business Vocabulary & Business Rules (SBVR) [26]"},{"key":"4_CR4","unstructured":"Object Management Group: Semantics of Business Vocabulary and Business Rules (SBVR) \u2013 Interim Specification. OMG Document \u2013 dtc\/06-03-02 (2006)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Goedertier, S., Vanthienen, J.: EM-BrA<Superscript>2<\/Superscript>CE v0.2: A Vocabulary and Execution Model for Declarative Process Models. Fetew research report, K.U.Leuven (2007), http:\/\/www.econ.kuleuven.ac.be\/public\/ndbaf38\/EM-BrAACE","DOI":"10.2139\/ssrn.1086027"},{"key":"4_CR6","unstructured":"Baisley, D.E., Hall, J., Chapin, D.: Semantic Formulations in SBVR [26]"},{"key":"4_CR7","unstructured":"Unisys: Unisys rules modeler (2005) (10-11-2005), www.unisys.com"},{"key":"4_CR8","unstructured":"Digital Business Ecosystem (DBE): Sbeaver (2007), http:\/\/sbeaver.sourceforge.net"},{"issue":"2","key":"4_CR9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S.I., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"4_CR11","unstructured":"InterNational Committee for Information Technology Standards (INCITS): Role-Based Access Control. American National Standard ANSI\/INCITS 359-2004 (2004), http:\/\/csrc.nist.gov\/rbac"},{"key":"4_CR12","first-page":"345","volume-title":"Some Applications of a Unified Foundational Ontology in Business Modeling","author":"G. Guizzardi","year":"2005","unstructured":"Guizzardi, G., Wagner, G.: Ontologies and Business Systems Analysis. In: Rosemann, M., Green, P. (eds.) Some Applications of a Unified Foundational Ontology in Business Modeling, pp. 345\u2013367. IDEA Publisher, USA (2005)"},{"key":"4_CR13","unstructured":"Object Management Group: Business Motivation Model (BMM) \u2013 adopted specification. OMG Document \u2013 dtc\/2006-08-03 (2006)"},{"key":"4_CR14","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1093\/oso\/9780198537472.003.0007","volume-title":"Handbook of Logic in Artificial Intelligence and Logic Programming","author":"D. Nute","year":"1994","unstructured":"Nute, D.: Defeasible Logic. In: Handbook of Logic in Artificial Intelligence and Logic Programming, pp. 353\u2013395. Oxford University Press, New York (1994)"},{"issue":"2","key":"4_CR15","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/371316.371517","volume":"2","author":"G. Antoniou","year":"2001","unstructured":"Antoniou, G., Billington, D., Governatori, G., Maher, M.J.: Representation results for defeasible logic. ACM Trans. Comput. Log.\u00a02(2), 255\u2013287 (2001)","journal-title":"ACM Trans. Comput. Log."},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/336992.337010","volume-title":"ACM Conference on Electronic Commerce","author":"B.N. Grosof","year":"1999","unstructured":"Grosof, B.N., Labrou, Y., Chan, H.Y.: A declarative approach to business rules in contracts: courteous logic programs in XML. In: ACM Conference on Electronic Commerce, pp. 68\u201377. ACM Press, New York (1999)"},{"issue":"4","key":"4_CR17","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1142\/S0218213001000623","volume":"10","author":"M.J. Maher","year":"2001","unstructured":"Maher, M.J., Rock, A., Antoniou, G., Billington, D., Miller, T.: Efficient defeasible reasoning systems. International Journal on Artificial Intelligence Tools\u00a010(4), 483\u2013501 (2001)","journal-title":"International Journal on Artificial Intelligence Tools"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/11580072_14","volume-title":"Rules and Rule Markup Languages for the Semantic Web","author":"N. Bassiliades","year":"2005","unstructured":"Bassiliades, N., Kontopoulos, E., Antoniou, G.: A visual environment for developing defeasible rule bases for the semantic web. In: Adi, A., Stoutenburg, S., Tabet, S. (eds.) RuleML 2005. LNCS, vol.\u00a03791, pp. 172\u2013186. Springer, Heidelberg (2005)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/11836025_28","volume-title":"The Semantic Web \u2013 ASWC 2006","author":"E. Kontopoulos","year":"2006","unstructured":"Kontopoulos, E., Bassiliades, N., Antoniou, G.: Visualizing defeasible logic rules for the semantic web. In: Mizoguchi, R., Shi, Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol.\u00a04185, pp. 278\u2013292. Springer, Heidelberg (2006)"},{"key":"4_CR20","unstructured":"Antoniou, G., Taveter, K., Berndtsson, M., Wagner, G., Spreeuwenberg, S.: A First-Version Visual Rule Language. Report IST-2004-506779, REWERSE (2004)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Vanthienen, J., Robben, F.: Developing legal knowledge based systems using decision tables. In: ICAIL, pp. 282\u2013291 (1993)","DOI":"10.1145\/158976.159011"},{"issue":"3","key":"4_CR22","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/S0169-023X(98)80003-7","volume":"27","author":"J. Vanthienen","year":"1998","unstructured":"Vanthienen, J., Mues, C., Aerts, A.: An Illustration of Verification and Validation in the Modelling Phase of KBS Development. Data Knowl. Eng.\u00a027(3), 337\u2013352 (1998)","journal-title":"Data Knowl. Eng."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Spreeuwenberg, S., Gerrits, R., Boekenoogen, M.: Valens: A knowledge based tool to validate and verify an aion knowledge base (2000)","DOI":"10.1007\/978-1-4757-6916-6_5"},{"key":"4_CR24","unstructured":"Vanthienen, J., Mues, C.: Prologa 5.3 - tabular knowledge modeling (2005)"},{"issue":"3","key":"4_CR25","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1145\/1015040.1015043","volume":"7","author":"M. Strembeck","year":"2004","unstructured":"Strembeck, M., Neumann, G.: An integrated approach to engineer and enforce context constraints in rbac environments. ACM Trans. Inf. Syst. Secur.\u00a07(3), 392\u2013427 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"4_CR26","unstructured":"W3C Workshop on Rule Languages for Interoperability, 27-28 April 2005, Washington, DC, USA. In: Rule Languages for Interoperability, W3C (2005)"}],"container-title":["Lecture Notes in Computer Science","Advances in Rule Interchange and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75975-1_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T01:29:44Z","timestamp":1708306184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75975-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540759744"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75975-1_4","relation":{},"subject":[]}}