{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:48Z","timestamp":1725562608225},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_25","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"321-328","source":"Crossref","is-referenced-by-count":8,"title":["Predictive Security Analysis for Event-Driven Processes"],"prefix":"10.1007","author":[{"given":"Roland","family":"Rieke","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zaharina","family":"Stoynova","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-540-85758-7_20","volume-title":"Business Process Management","author":"R.M. Dijkman","year":"2008","unstructured":"Dijkman, R.M.: Diagnosing Differences Between Business Process Models. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol.\u00a05240, pp. 261\u2013277. Springer, Heidelberg (2008)"},{"issue":"12","key":"25_CR2","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1016\/j.infsof.2008.02.006","volume":"50","author":"R.M. Dijkman","year":"2008","unstructured":"Dijkman, R.M., Dumas, M., Ouyang, C.: Semantics and analysis of business process models in BPMN. Inf. Softw. Technol.\u00a050(12), 1281\u20131294 (2008)","journal-title":"Inf. Softw. Technol."},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/1135777.1135819","volume-title":"WWW 2006: Proc. of the 15th International Conference on World Wide Web","author":"R. Kazhamiakin","year":"2006","unstructured":"Kazhamiakin, R., Pistore, M., Santuari, L.: Analysis of communication models in web service compositions. In: WWW 2006: Proc. of the 15th International Conference on World Wide Web, pp. 267\u2013276. ACM, New York (2006)"},{"key":"25_CR4","volume-title":"The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems","author":"D. Luckham","year":"2002","unstructured":"Luckham, D.: The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Addison-Wesley, Reading (2002)"},{"unstructured":"Massart, T., Meuter, C.: Efficient online monitoring of LTL properties for asynchronous distributed systems. Tech. rep., Universit\u00e9 Libre de Bruxelles (2006)","key":"25_CR5"},{"unstructured":"McCoy, D.W.: Business Activity Monitoring: Calm Before the Storm. Gartner Research (2002)","key":"25_CR6"},{"key":"25_CR7","first-page":"497","volume-title":"Proceedings of the Workshop on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2006), held in conjunction with the 18th Conference on Advanced Information Systems (CAiSE 2006)","author":"M. Netjes","year":"2006","unstructured":"Netjes, M., Reijers, H., Van der Aalst, W.P.: Supporting the BPM life-cycle with FileNet. In: Proceedings of the Workshop on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2006), held in conjunction with the 18th Conference on Advanced Information Systems (CAiSE 2006), Luxembourg, pp. 497\u2013508. Namur University Press, Namur (2006)"},{"unstructured":"Nicolett, M., Kavanagh, K.M.: Magic Quadrant for Security Information and Event Management. Gartner RAS Core Reasearch Note (May 2009)","key":"25_CR8"},{"key":"25_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s001650050033","volume":"11","author":"P. Ochsenschl\u00e4ger","year":"1999","unstructured":"Ochsenschl\u00e4ger, P., Repp, J., Rieke, R., Nitsche, U.: The SH-Verification Tool Abstraction-Based Verification of Co-operating Systems. Formal Aspects of Computing, The International Journal of Formal Method\u00a011, 1\u201324 (1999)","journal-title":"Formal Aspects of Computing, The International Journal of Formal Method"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/3-540-44892-6_4","volume-title":"Middleware 2003","author":"P.R. Pietzuch","year":"2003","unstructured":"Pietzuch, P.R., Shand, B., Bacon, J.: A framework for event composition in distributed systems. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol.\u00a02672, pp. 62\u201382. Springer, Heidelberg (2003)"},{"issue":"9","key":"25_CR11","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1016\/j.datak.2009.02.014","volume":"68","author":"A. Rozinat","year":"2009","unstructured":"Rozinat, A., Wynn, M.T., van der Aalst, W.M.P., ter Hofstede, A.H.M., Fidge, C.J.: Workflow simulation for operational decision support. Data Knowl. Eng.\u00a068(9), 834\u2013850 (2009)","journal-title":"Data Knowl. Eng."}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:36:34Z","timestamp":1619786194000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}