{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:04:04Z","timestamp":1743051844741,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540789413"},{"type":"electronic","value":"9783540789420"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-78942-0_34","type":"book-chapter","created":{"date-parts":[[2008,4,18]],"date-time":"2008-04-18T06:45:30Z","timestamp":1208501130000},"page":"352-364","source":"Crossref","is-referenced-by-count":2,"title":["Mokum for Correctness by Design in Relation to MDA"],"prefix":"10.1007","author":[{"given":"Reind","family":"van de Riet","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","first-page":"1","volume-title":"DKE on BPM, Data and Knowledge Engineering","author":"W.M.P. van der Aalst","year":"2004","unstructured":"van der Aalst, W.M.P., Wieske, M., Verbeek, H.M.W.: Advances in Business Process Management. In: DKE on BPM, Data and Knowledge Engineering, vol. 50(1), July 2004, pp. 1\u2013115, Elsevier, Amsterdam (2004) (special issue)"},{"key":"34_CR2","unstructured":"Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modelling Language, User Guide, Addison Wesley (1997)"},{"key":"34_CR3","unstructured":"Brown, A.: An Introduction to Model Driven Architecture, Part I: MDA and today\u2019s systems, IBM (February, 2004)"},{"key":"34_CR4","unstructured":"Caminada, M.W.A., Steuten, A.A.G., van de Riet, R.P.: An evaluation of linguistically based modeling approaches on the basis of the EANCOM EDI standard. In: Goldkuhl, G., Lind, M., Seigerroth, U., Aegerfalk, P.J. (Eds.) Proceedings of the Fourth International Workshop The Language Action Perspective on Communication Modelling. Jonkoping International Business School, pp. 29\u201342 (1999)"},{"issue":"1","key":"34_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0169-023X(01)00014-3","volume":"38","author":"F. Dehne","year":"2001","unstructured":"Dehne, F.: Steuten, A.A.G., van de Riet, R.P.: WORDNET++: A Lexicon for the Color-X Method. Data and Knowledge Engineering, 38(1), 3\u201330 (2001)","journal-title":"Data and Knowledge Engineering"},{"key":"34_CR6","unstructured":"Dehne, F., Steuten, A.A.G., van de Riet, R.P.: Linguistic and Graphical tools for the COLOR-X Method, Computer Science Department, IR482, Vrije Universiteit (December 2000)"},{"key":"34_CR7","unstructured":"Gudes, E., van de Riet, R.P., Burg, J.F.M., Olivier, M.S.: Alter-egos and Roles-Supporting Workflow Security in Cyberspace. In: Lin, T.Y., Qian, X. (Eds.), Proc. IFIP WG11.3 Work. Conf. on Database Security, Lake Tahoe, pp.152\u2013166 (1997)"},{"key":"34_CR8","first-page":"346","volume-title":"Database and Expert Systems Applications","author":"M.S.E. Olivier","year":"1998","unstructured":"Olivier, M.S.E., Gudes, R.P., van de Riet, J.F.M.: Burg: Specifying Application-level Security in Workflow Systems. In: Wagner, R. (ed.) Database and Expert Systems Applications, IEEE Computer Society, pp. 346\u2013354. IEEE Computer Society, Los Alamitos (1998)"},{"issue":"3","key":"34_CR9","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.datak.2004.03.003","volume":"50","author":"R.P. van de Riet","year":"2004","unstructured":"van de Riet, R.P.: The Future Refereeing Process in Cyberspace Data&Knowledge Engineering Journal, An Attempt in Guaranteeing Security&Privacy on three levels, Data and Knowledge Engineering, 50(3), 305\u2013339 (2004)","journal-title":"Data and Knowledge Engineering"},{"key":"34_CR10","unstructured":"van de Riet, R.P., Burg, J.F.M.: Modelling Alter Egos in Cyberspace: Using a Work Flow management tool: who takes care of the Security and Privacy? In: Lobodzinsky, S., Tomek, I. (eds.) Proceedings of WebNet 1997, Toronto, Association for the Advancement of Computing in Education), Charlottesville, USA, pp. 582\u2013588 (1997)"},{"key":"34_CR11","unstructured":"van de Riet, R.P.: 25 years of Mokum for Data&Knowledge Engineering. In: DKE25Y, celebrating 25 years of publishing Data&Knowledge Engineering (2008) (special issue)"},{"key":"34_CR12","unstructured":"Steuten, A.A.G., van de Riet, R.P., Dietz, J.L.G.: Linguistically based Conceptual Modeling of Business Communication. In: Proceedings of the Fourth International Conference on Applications of Natural Language to Information System, University of Klagenfurt, Austria, 17\u201319 June 1999, pp. 91\u2013106 (1999)"},{"key":"34_CR13","first-page":"121","volume-title":"NLDB 1999 (special issue), Data & Knowledge Engineering","author":"A.A.G. Steuten","year":"1999","unstructured":"Steuten, A.A.G., van de Riet, R.P., Dietz, J.L.G.: Linguistically based Conceptual Modeling of Business Communication. In: M\u00e9tais, E., Mayr, H.C. (eds.) NLDB 1999 (special issue), Data & Knowledge Engineering, vol. 35(2), pp. 121\u2013136. North Holland, Amsterdam (1999)"},{"key":"34_CR14","series-title":"LNCS","first-page":"1","volume-title":"NLDB 2000","author":"A.A.G. Steuten","year":"2001","unstructured":"Steuten, A.A.G., Dehne, F., van de Riet, R.P.: WORDNET++: A Lexicon Supporting the COLOR-X Method. In: Bouzeghoub, M., Kedad, Z., M\u00e9tais, E. (eds.) NLDB 2000. LNCS, vol. 1959, pp. 1\u201316. Springer, Heidelberg (2001)"},{"issue":"1","key":"34_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0169-023X(01)00014-3","volume":"38","author":"F. Dehne","year":"2001","unstructured":"Dehne, F., Steuten, A.A.G., van de Riet, R.P.: WORDNET++: A Lexicon for the Color-X Method. Data & Knowledge Engineering 38(1), 3\u201330 (2001)","journal-title":"Data & Knowledge Engineering"},{"issue":"3","key":"34_CR16","first-page":"353","volume":"11","author":"W. Teepe","year":"2003","unstructured":"Teepe, W., van de Riet, R., Olivier, M.: WorkFlow Analyzed for Security and Privacy in using Databases. Journal of Security 11(3), 353\u2013364 (2003)","journal-title":"Journal of Security"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems and e-Business Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78942-0_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T17:59:34Z","timestamp":1676051974000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-78942-0_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540789413","9783540789420"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78942-0_34","relation":{},"ISSN":["1865-1348"],"issn-type":[{"type":"print","value":"1865-1348"}],"subject":[],"published":{"date-parts":[[2008]]}}}