{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:31:27Z","timestamp":1760707887706},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768876"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76888-3_83","type":"book-chapter","created":{"date-parts":[[2007,11,21]],"date-time":"2007-11-21T10:46:11Z","timestamp":1195641971000},"page":"603-612","source":"Crossref","is-referenced-by-count":20,"title":["Declarative Process Modeling with Business Vocabulary and Business Rules"],"prefix":"10.1007","author":[{"given":"Stijn","family":"Goedertier","sequence":"first","affiliation":[]},{"given":"Jan","family":"Vanthienen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"83_CR1","unstructured":"Andrews, T.: et al.: Business process execution language for web services (bpel4ws) version 1.1 (2003), http:\/\/www.ibm.com\/developerworks\/library\/ws-bpel\/"},{"key":"83_CR2","unstructured":"Object Management Group: Business Process Modeling Notation (BPMN) \u2013 final adopted specification. OMG Document \u2013 dtc\/06-02-01 (2006)"},{"key":"83_CR3","unstructured":"Object Management Group: UML 2.0 Superstructure Specification. OMG Document \u2013 formal\/05-07-04 (2005)"},{"key":"83_CR4","volume-title":"Addison-Wesley Professional","author":"T. Morgan","year":"2002","unstructured":"Morgan, T.: Business Rules and Information Systems: Aligning IT with Business Goals. In: Addison-Wesley Professional (2002)"},{"key":"83_CR5","unstructured":"Chapin, D.: Semantics of Business Vocabulary & Business Rules (SBVR). In: Hawke, S., de Sainte Marie, C., Tabet, S. (eds.) Rule Languages for Interoperability, W3C (2005)"},{"key":"83_CR6","unstructured":"Object Management Group: Semantics of Business Vocabulary and Business Rules (SBVR) \u2013 Interim Specification. OMG Document \u2013 dtc\/06-03-02 (2006)"},{"key":"83_CR7","unstructured":"Unisys: Unisys rules modeler. [10-11-2005] (2005), http:\/\/www.unisys.com\/eprise\/main\/admin\/corporate\/doc\/Unisys_Rules_Modeler_Insert.pdf"},{"key":"83_CR8","doi-asserted-by":"crossref","unstructured":"Goedertier, S., Haesen, R., Vanthienen, J.: EM-BrA2CE v0.1: A Vocabulary and Execution Model for Declarative Process Models. FETEW research report, K.U.Leuven (2007), http:\/\/www.econ.kuleuven.ac.be\/public\/ndbaf38\/EM-BrAACE","DOI":"10.2139\/ssrn.1086027"},{"issue":"2","key":"83_CR9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"3","key":"83_CR10","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S.I., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"83_CR11","unstructured":"InterNational Committee for Information Technology Standards (INCITS): Role-Based Access Control. American National Standard ANSI\/INCITS 359-2004 (2004), http:\/\/csrc.nist.gov\/rbac"},{"key":"83_CR12","doi-asserted-by":"crossref","unstructured":"Guizzardi, G., Wagner, G.: Ontologies and Business Systems Analysis. In: Rosemann, M., Green, P. (eds.) Some Applications of a Unified Foundational Ontology in Business Modeling. IDEA Publisher, pp. 345\u2013367 (2005)","DOI":"10.4018\/978-1-59140-339-5.ch013"},{"key":"83_CR13","volume-title":"Modeling Concepts, Architecture and Implementation","author":"S. Jablonski","year":"1996","unstructured":"Jablonski, S., Bussler, C.: Workflow Management. In: Modeling Concepts, Architecture and Implementation, International Thomson Computer Press, Modeling Concepts (1996)"},{"key":"83_CR14","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/11837862_2","volume-title":"Business Process Management Workshops","author":"Stijn Goedertier","year":"2006","unstructured":"Goedertier, S., Vanthienen, J.: Designing compliant business processes with obligations and permissions, 5\u201314"},{"issue":"5","key":"83_CR15","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/S0306-4379(02)00027-3","volume":"28","author":"G. Wagner","year":"2003","unstructured":"Wagner, G.: The agent-object-relationship metamodel: towards a unified view of state and behavior. Inf. Syst.\u00a028(5), 475\u2013504 (2003)","journal-title":"Inf. Syst."},{"key":"83_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"RuleML 2007","author":"S. Goedertier","year":"2007","unstructured":"Goedertier, S., Vanthienen, J.: Specifying Process-Aware Access Control Rules in SBVR. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, vol.\u00a04824, Springer, Heidelberg (2007)"},{"issue":"2","key":"83_CR17","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.datak.2004.07.003","volume":"53","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., Weske, M., Gr\u00fcnbauer, D.: Case handling: a new paradigm for business process support. Data Knowl. Eng.\u00a053(2), 129\u2013162 (2005)","journal-title":"Data Knowl. Eng."},{"key":"83_CR18","unstructured":"The OWL Services Coalition: OWL-S 1.2 Pre-Release. Available from 2006, http:\/\/www.ai.sri.com\/daml\/services\/owl-s\/1.2\/"},{"issue":"5","key":"83_CR19","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.is.2004.05.002","volume":"30","author":"S.W. Sadiq","year":"2005","unstructured":"Sadiq, S.W., Orlowska, M.E., Sadiq, W.: Specification and validation of process constraints for flexible workflows. Inf. Syst.\u00a030(5), 349\u2013378 (2005)","journal-title":"Inf. Syst."},{"issue":"1","key":"83_CR20","first-page":"77","volume":"1","author":"D. Roman","year":"2005","unstructured":"Roman, D., Keller, U., Lausen, H., de Bruijn, J., Lara, R., Stollberg, M., Polleres, A., Feier, C., Bussler, C., Fensel, D.: Web service modeling ontology. Applied Ontology\u00a01(1), 77\u2013106 (2005)","journal-title":"Applied Ontology"},{"key":"83_CR21","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/11837862_18","volume-title":"Business Process Management Workshops","author":"M. Pesic","year":"2006","unstructured":"Pesic, M., van der Aalst, W.M.P.: A declarative approach for flexible business processes management, pp. 169\u2013180"},{"key":"83_CR22","series-title":"Lecture Notes in Computer Science","volume-title":"BPI 2007","author":"S. Goedertier","year":"2007","unstructured":"Goedertier, S., Martens, D., Baesens, B., Haesen, R., Vanthienen, J.: Process Mining as First-Order Classification Learning on Logs with Negative Events. In: BPI 2007. LNCS, Springer, Heidelberg (2007)"},{"key":"83_CR23","series-title":"Lecture Notes in Computer Science","volume-title":"BPM 2006","year":"2006","unstructured":"Eder, J., Dustdar, S. (eds.): BPM 2006. LNCS, vol.\u00a04103. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76888-3_83.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:45:21Z","timestamp":1619520321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76888-3_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768876"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76888-3_83","relation":{},"subject":[]}}