{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:09:49Z","timestamp":1742393389856},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540888079"},{"type":"electronic","value":"9783540888086"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88808-6_9","type":"book-chapter","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T13:06:41Z","timestamp":1225199201000},"page":"58-72","source":"Crossref","is-referenced-by-count":13,"title":["A Rule-Based Framework Using Role Patterns for Business Process Compliance"],"prefix":"10.1007","author":[{"given":"Akhil","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Rong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"9_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1022883727209","volume":"14","author":"W.M.P. Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., et al.: Workflow patterns. Distributed and Parallel Databases\u00a014(3), 5\u201351 (2003)","journal-title":"Distributed and Parallel Databases"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11575771_11","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., Beer, H., van Dongen, B.: Process mining and verification of properties: An approach based on temporal logic. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol.\u00a03760, pp. 130\u2013147. Springer, Heidelberg (2005)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Ahn, G.-J., et al.: Injecting RBAC to secure a web-based workflow system. In: Fifth ACM Workshop on Role-Based Access Control, Berlin, Germany (July 2000)","DOI":"10.1145\/344287.344295"},{"issue":"2","key":"9_CR4","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/371316.371517","volume":"2","author":"G. Antoniou","year":"2001","unstructured":"Antoniou, G., et al.: Representation results for defeasible logic. ACM Trans. Comput. Log.\u00a02(2), 255\u2013287 (2001)","journal-title":"ACM Trans. Comput. Log."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Antoniou, G., Dimaresis, N., Governatori, G.: A System for Modal and Deontic Defeasible Reasoning. In: Australian Conference on Artificial Intelligence 2007, pp. 609\u2013613 (2007)","DOI":"10.1007\/978-3-540-76928-6_62"},{"key":"9_CR6","unstructured":"Berg, D.: Turning Sarbanes-Oxley Projects into Strategic Business Processes. Sarbanes-Oxley Compliance Journal (November 2004)"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur.\u00a02(1), 65\u2013104 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Botha, R.A., Eloff, J.H.P.: Separation of duties for access control enforcement in workflow environments. IBM Systems Journal\u00a040(3) (2001)","DOI":"10.1147\/sj.403.0666"},{"key":"9_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-97005-4","volume-title":"Programming in Prolog","author":"W.F. Clocksin","year":"1987","unstructured":"Clocksin, W.F., Mellish, C.S.: Programming in Prolog. Springer, New York (1987)"},{"key":"9_CR10","unstructured":"Committee of Sponsoring Organizations. Internal Control \u2013 Integrated Framework, http:\/\/www.coso.org\/publications\/executive_summary_integrated_framework.htm"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Ferguson, D., Stockton, M.: Enterprise Business Process Management - Architecture, Technology and Standards. In: Business Process Management, Vienna, Austria, pp. 1\u201315 (2006)","DOI":"10.1007\/11841760_1"},{"key":"9_CR12","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software, hardcover","author":"Gamma","year":"1994","unstructured":"Gamma, Erich, et al.: Design Patterns: Elements of Reusable Object-Oriented Software, hardcover. Addison-Wesley, Reading (1994)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-75975-1_4","volume-title":"Advances in Rule Interchange and Applications","author":"S. Goedertier","year":"2007","unstructured":"Goedertier, S., Mues, C., Vanthienen, J.: Specifying Process-Aware Access Control Rules in SBVR. In: Paschke, A., Biletskiy, Y. (eds.) RuleML 2007. LNCS, vol.\u00a04824, pp. 39\u201352. Springer, Heidelberg (2007)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Goedertier, S., Vanthienen, J.: Declarative Process Modeling with Business Vocabulary and Business Rules. In: Proceedings of Object-Role Modeling (ORM 2007) (2007)","DOI":"10.1007\/978-3-540-76888-3_83"},{"issue":"4","key":"9_CR15","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1142\/S0218843006001529","volume":"15","author":"G. Governatori","year":"2006","unstructured":"Governatori, G., Milosevic, Z.: A Formal Analysis of a Business Contract Language. Int. J. Cooperative Inf. Syst.\u00a015(4), 659\u2013685 (2006)","journal-title":"Int. J. Cooperative Inf. Syst."},{"key":"9_CR16","volume-title":"Manager\u2019s Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud","author":"S. Green","year":"2004","unstructured":"Green, S.: Manager\u2019s Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud. Wiley, Chichester (2004)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Haworth, D., Pietron, L.: Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799. Information Systems Management (Winter 2006)","DOI":"10.1201\/1078.10580530\/45769.23.1.20061201\/91775.9"},{"key":"9_CR18","volume-title":"The Spin Model Checker","author":"G. Holzmann","year":"2003","unstructured":"Holzmann, G.: The Spin Model Checker. Addison-Wesley, Reading (2003)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Huang, W.-K., Atluri, V.: Secureflow: a secure web-enabled workflow management system. In: Proceedings of the Fourth ACM Workshop on Role-Based Access Control, pp. 83\u201394 (1999)","DOI":"10.1145\/319171.319179"},{"key":"9_CR20","unstructured":"IBM Websphere Business Modeler (WBM), Version 6, http:\/\/www-306.ibm.com\/software\/integration\/wbimodeler\/"},{"key":"9_CR21","unstructured":"Information FrameWork (IFW), IBM Industry Models for Financial Services, http:\/\/www03.ibm.com\/industries\/financialservices\/doc\/content\/bin\/fss_ifw_gim_2006.pdf"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Kuhn, D.R.: Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems. In: Proceedings 2nd ACM Workshop on Role-Based Access Control, Fairfax, VA, pp. 23\u201330 (October 1997)","DOI":"10.1145\/266741.266749"},{"issue":"1","key":"9_CR23","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.datak.2004.03.005","volume":"51","author":"P. Linington","year":"2004","unstructured":"Linington, P., et al.: A unified behavioural model and a contract language for extended enterprise. Data Knowl. Eng.\u00a051(1), 5\u201329 (2004)","journal-title":"Data Knowl. Eng."},{"issue":"3","key":"9_CR24","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/S0164-1212(03)00175-4","volume":"73","author":"D. Liu","year":"2004","unstructured":"Liu, D., et al.: Role-based authorizations for workflow systems in support of task-based separation of duty. J. Syst. Softw.\u00a073(3), 375\u2013387 (2004)","journal-title":"J. Syst. Softw."},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Nagaratnam, N., et al.: Business-driven application security: From modeling to managing secure applications. IBM Systems Journal\u00a044(4) (2005)","DOI":"10.1147\/sj.444.0847"},{"key":"9_CR26","volume-title":"Handbook of logic in artificial intelligence and logic programming: Nonmonotonic reasoning and uncertain reasoning","author":"D. Nute","year":"1994","unstructured":"Nute, D.: Defeasible logic. In: Handbook of logic in artificial intelligence and logic programming: Nonmonotonic reasoning and uncertain reasoning, vol.\u00a03. Oxford University Press, Inc., New York (1994)"},{"key":"9_CR27","unstructured":"Object Management Group (OMG), Object Constraint Language (OCL), http:\/\/www.omg.org\/technology\/documents\/modeling_spec_catalog.htm"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Sadiq, S., Governatori, G., Namiri, K.: Modeling Control Objectives for Business Process Compliance. In: BPM 2007, pp. 149\u2013164 (2007)","DOI":"10.1007\/978-3-540-75183-0_12"},{"issue":"2","key":"9_CR29","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Simon, R., Zurko, M.E.: Separation of Duty in Role-Based Environments. In: Proceedings of the 10th Computer Security Foundation Workshop, Rockport, MA, June 10\u201312, 1997, pp. 183\u2013194 (1997)","DOI":"10.1109\/CSFW.1997.596811"},{"issue":"3","key":"9_CR31","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.is.2005.11.008","volume":"32","author":"J. Wainer","year":"2007","unstructured":"Wainer, J., Kumar, A., Barthelmess, P.: DW-RBAC: A Formal Security Model of Delegation and Revocation in Workflow Systems. Information Systems\u00a032(3), 365\u2013384 (2007)","journal-title":"Information Systems"}],"container-title":["Lecture Notes in Computer Science","Rule Representation, Interchange and Reasoning on the Web"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88808-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T23:31:27Z","timestamp":1557876687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88808-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540888079","9783540888086"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88808-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}